Patents by Inventor Ryan Yong Kim

Ryan Yong Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9438698
    Abstract: Embodiments include a method of disseminating information regarding at least one electrical device using a registration server. The at least one electrical device has unique identification information, an internal IP address, and an external IP address, wherein the external IP address is an IP address of a first gateway device for a first local network.
    Type: Grant
    Filed: March 24, 2014
    Date of Patent: September 6, 2016
    Assignee: Belkin International, Inc.
    Inventors: Ryan Yong Kim, Naga Yerramsetti, Ricardo Federico Maurino
  • Patent number: 9426118
    Abstract: Systems and techniques for granting of network access to a new network device are described. Specifically, various techniques and systems are provided for connecting a new network device to a network and limiting access of the network device while authenticating the new network device. Exemplary embodiments of the present invention include a computer-implemented method.
    Type: Grant
    Filed: October 28, 2014
    Date of Patent: August 23, 2016
    Assignee: BELKIN INTERNATIONAL INC.
    Inventor: Ryan Yong Kim
  • Patent number: 9426153
    Abstract: The present disclosure relates to the setup of multiple devices on a local area network. Specifically, various techniques and systems are provided for utilizing a network device to efficiently add a new device to a local area network using an existing network device. Exemplary embodiments of the present invention include a computer-implemented method.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: August 23, 2016
    Assignee: BELKIN INTERNATIONAL INC.
    Inventors: Ryan Yong Kim, Venkata Subba Rao Pathuri
  • Publication number: 20160241445
    Abstract: Techniques for identifying and resolving network device rules conflicts and recursive operations are provided. In some embodiments, a method may include receiving an existing rule corresponding to the operation of a network device. Input corresponding to a new rule corresponding to operation of the network device may be detected. In some embodiments, the existing rule and the new rule may be analyzed, wherein the analysis includes determining that a conflict exists between the existing rule and the new rule and/or determining that the new rule and the existing rule are associated with a recursive operation of the network device. In some embodiments, the operations are analyzed, wherein the analysis identifies that the operations of the network device include a recursive operation. An indication of the conflict between the existing rule and the new rule, or an indication of the recursive operation, may be provided.
    Type: Application
    Filed: April 22, 2016
    Publication date: August 18, 2016
    Applicant: Belkin International, Inc.
    Inventor: Ryan Yong Kim
  • Publication number: 20160226732
    Abstract: The present disclosure relates to techniques for interacting with an electronic device. More specifically, the present disclosure relates to initiating action(s) using an interface configured to control operation of IoT devices. An example embodiment includes receiving, at a computing device, a communication including a unique identifier for a network device connected to a network, using the unique identifier to determine a resource bundle for the network device, the resource bundle defining an interface module for the network device, wherein the interface module is configured to display one or more interface elements usable to control the network device, and transmitting the resource bundle, wherein when the resource bundle is received, the resource bundle facilitates generating the interface module.
    Type: Application
    Filed: December 4, 2015
    Publication date: August 4, 2016
    Inventors: Ryan Yong Kim, Jon Robertsen Plummer, EuChong Son, Venkata Subba Rao Pathuri
  • Publication number: 20160226845
    Abstract: Techniques for exchanging security keys via a trusted proxy are provided. For example, a method may include receiving, at a computing device, a communication including a unique identifier for an access device connected to a network, wherein unique identifiers include an expiration time. The method may further include using the unique identifier to determine a security key for the access device. The method may also include receiving, at the computing device, a new communication, wherein the new communication includes the unique identifier. The method may further include validating the unique identifier for the access device, wherein validating includes determining whether the unique identifier has expired, and then using the validated identifier to retrieve the security key for the access device. The method may also include transmitting the security key, wherein when the security key is received, the security key facilitates generating a signature.
    Type: Application
    Filed: February 4, 2016
    Publication date: August 4, 2016
    Applicant: Belkin International, Inc.
    Inventors: Ryan Yong Kim, Venkata Subba Rao Pathuri
  • Publication number: 20160195864
    Abstract: Described are systems and methods for autonomously operating network devices by revising the operational status of the network devices in response to conditions or physical quantities sensed by one or more sensors.
    Type: Application
    Filed: December 4, 2015
    Publication date: July 7, 2016
    Applicant: Belkin International, Inc.
    Inventor: Ryan Yong Kim
  • Patent number: 9384075
    Abstract: Techniques for coordinated and device-distributed detection of abnormal network device operation are provided. In some embodiments, a method may include identifying a suspicious activity condition associated with a suspect network device. The suspicious activity condition may also be associated with the device itself. Activity of the network device may be detected and analyzed, including additional data corresponding to the activity from one or more other network devices in the same network. In response to determining that the suspicious activity condition is satisfied, an alert communication can be transmitted that identifies the suspect network device. When the activity is associated with the device itself, a local operation at the network device may be changed.
    Type: Grant
    Filed: April 2, 2015
    Date of Patent: July 5, 2016
    Assignee: Belkin International Inc.
    Inventor: Ryan Yong Kim
  • Publication number: 20160174345
    Abstract: This disclosure relates in general to a networked light switch. More specifically, the disclosure relates to a light switch that, in response to detecting a local input or motion, transmits a communication that causes another light switch to change a state of a light. This disclosure further relates to techniques for detecting an abnormal current draw state of an electrical device such as a lighting device are described; systems including in-wall network devices having a user-facing restore button for restoring some or all of the customizable settings to a factory default state; and techniques for controlling device operations in accordance with scenes or modes.
    Type: Application
    Filed: February 9, 2016
    Publication date: June 16, 2016
    Applicant: Belkin International, Inc.
    Inventors: Francis Michael Kelly, Jon Plummer, Ryan Yong Kim, Li-ter Chen
  • Publication number: 20160171374
    Abstract: Techniques and systems are provided for predictive modeling based on interactions with a network device. For example, a method may include generating a prediction including a correlation between an interaction with a network device and a context, wherein the interaction is associated with a function performed by the network device. Confidence parameters associated with the prediction can be determined. The prediction can be tested by analyzing received interaction data and contextual data, and the analysis can include determining whether the interaction with the network device occurred in the correlated context. A confidence value can be calculated based on the testing outcome, and can be compared to the confidence parameters. A message relating to modification of the confidence parameters can be transmitted.
    Type: Application
    Filed: March 26, 2015
    Publication date: June 16, 2016
    Inventor: Ryan Yong Kim
  • Publication number: 20160165650
    Abstract: Techniques are described for determining connectivity to a network device to optimize performance for controlling operation of one or more network devices. A computing device may determine connectivity to a network device to send a request for information to the network device. The computing device can determine whether it has access to a network (e.g., a wireless network), which includes the network device. The computing device may determine whether it has authorization to communicate with the network device on the network. Authorization may be based on the registration of the network device to communicate with the computing device. When the computing device can access the network and when the computing is authorized to communicate with the network device, communication (e.g., a request) may occur using the network or by direct transmission to the network device. Otherwise, the computing device may communicate with the network device using a remote network.
    Type: Application
    Filed: December 3, 2015
    Publication date: June 9, 2016
    Inventors: Ryan Yong Kim, Venkata Subba Rao Pathuri, Gursharan Sidhu
  • Publication number: 20160164748
    Abstract: Techniques for identifying and resolving network device rules conflicts and recursive operations are provided. In some embodiments, a method may include receiving an existing rule corresponding to the operation of a network device. Input corresponding to a new rule corresponding to operation of the network device may be detected. In some embodiments, the existing rule and the new rule may be analyzed, wherein the analysis includes determining that a conflict exists between the existing rule and the new rule and/or determining that the new rule and the existing rule are associated with a recursive operation of the network device. In some embodiments, the operations are analyzed, wherein the analysis identifies that the operations of the network device include a recursive operation. An indication of the conflict between the existing rule and the new rule, or an indication of the recursive operation, may be provided.
    Type: Application
    Filed: December 4, 2015
    Publication date: June 9, 2016
    Applicant: Belkin International, Inc.
    Inventor: Ryan Yong Kim
  • Publication number: 20160165570
    Abstract: Techniques and systems for determining locations of devices using location data sources are provided. For example, a network device, method, and computer-program product may be provided. In one example, a method may include receiving, on a computing device, a request to locate a device, wherein the request includes an identifier of the device. The method may further include receiving a communication from the device, wherein the communication includes the identifier of the device, and obtaining a location of the device. The method may further include transmitting the location of the device and the identifier of the device to a server, wherein the server is configured to use the location of the device and the identifier of the device to send a response to the requestor of the request.
    Type: Application
    Filed: December 3, 2015
    Publication date: June 9, 2016
    Applicant: Belkin International, Inc.
    Inventors: Ryan Yong Kim, Jon Plummer, David Shao
  • Publication number: 20160165651
    Abstract: Techniques for associating devices and users with a local area network using network identifiers are provided. For example, a method, system, and computer-program product for associating network devices with a local area network using a network identifier are provided. For example, a method may include receiving, at a computing device, a communication including a unique identifier for a network device connected to a network. The method may further include using the unique identifier to determine properties of the network device and generating a network identifier for the network, wherein the network identifier includes an indication of a time at which the network identifier is generated, an indication of the computing device, and an indication of the network device properties. The method can also include transmitting the network identifier, wherein when the network identifier is received, the network identifier facilitates identifying the network and associating the network device with the network.
    Type: Application
    Filed: December 4, 2015
    Publication date: June 9, 2016
    Applicant: Belkin International, Inc.
    Inventors: Venkata Subba Rao Pathuri, Ryan Yong Kim, Gursharan Sidhu, Naga Yerramsetti, Jimmy Chung, Brian Knopf
  • Publication number: 20160164831
    Abstract: Techniques and systems for operating a device as a proxy network address translation device for other devices are provided. For example, a method, computing device, or computer-program product may be provided. In one example, a method may include receiving a communication that includes a performance metric of one or more devices on a local network. The computing device and the one or more devices share a common network service provider. The method may further include determining, based on the performance metric, that the computing device is selected for operating as a proxy network address translation device for the one or more devices that share the common network service provider. The method may further include aggregating network address translation traversal for the one or more devices, including establishing a single network address translation connection with the common network service provider.
    Type: Application
    Filed: December 3, 2015
    Publication date: June 9, 2016
    Applicant: Belkin International, Inc.
    Inventor: Ryan Yong Kim
  • Publication number: 20160157326
    Abstract: This disclosure relates in general to a networked light switch. More specifically, the disclosure relates to a light switch that, in response to detecting a local input or motion, transmits a communication that causes another light switch to change a state of a light. This disclosure further relates to techniques for detecting an abnormal current draw state of an electrical device such as a lighting device are described; systems including in-wall network devices having a user-facing restore button for restoring some or all of the customizable settings to a factory default state; and techniques for controlling device operations in accordance with scenes or modes.
    Type: Application
    Filed: February 9, 2016
    Publication date: June 2, 2016
    Applicant: Belkin International, Inc.
    Inventors: Francis Michael Kelly, Jon Plummer, Ryan Yong Kim, Li-ter Chen
  • Publication number: 20160149777
    Abstract: The present disclosure relates to using sensors and measurements from sensors to trigger actions within a network. Specifically, various techniques and systems are provided for measuring usage or measurements, using sensors, of utilities or other environmental factors, generating profiles based on the usage or measurements, and triggering actions within a network device based on the usage, measurements and profiles. Embodiments of the present invention may include, for example, compiling historical usage based on the use or measurements detected by a network device and generating a usage profile based on that use or measurements. The normal usage profile may be compared with the usage over a certain predetermined period of time to detect any abnormal use or measurements from the network device, and an action may be taken as a result of an abnormality.
    Type: Application
    Filed: November 21, 2014
    Publication date: May 26, 2016
    Inventor: Ryan Yong Kim
  • Publication number: 20160149755
    Abstract: The present disclosure relates to using sensors and measurements from sensors to trigger actions within a network. Specifically, various techniques and systems are provided for measuring usage or measurements, using sensors, of utilities or other environmental factors, generating profiles based on the usage or measurements, and triggering actions within a network device based on the usage, measurements and profiles. Embodiments of the present invention may include, for example, compiling historical usage based on the use or measurements detected by a network device and generating a usage profile based on that use or measurements. The normal usage profile may be compared with the usage over a certain predetermined period of time to detect any abnormal use or measurements from the network device, and an action may be taken as a result of an abnormality.
    Type: Application
    Filed: November 21, 2014
    Publication date: May 26, 2016
    Inventor: Ryan Yong Kim
  • Publication number: 20160150298
    Abstract: The present disclosure relates to using sensors and measurements from sensors to trigger actions within a network. Specifically, various techniques and systems are provided for measuring usage or measurements, using sensors, of utilities or other environmental factors, generating profiles based on the usage or measurements, and triggering actions within a network device based on the usage, measurements and profiles. Embodiments of the present invention may include, for example, compiling historical usage based on the use or measurements detected by a network device and generating a usage profile based on that use or measurements. The normal usage profile may be compared with the usage over a certain predetermined period of time to detect any abnormal use or measurements from the network device, and an action may be taken as a result of an abnormality.
    Type: Application
    Filed: November 21, 2014
    Publication date: May 26, 2016
    Inventor: Ryan Yong Kim
  • Patent number: 9348689
    Abstract: Embodiments relate to systems and methods for detecting failure-risk events at devices and facilitating local and/or remote data back-up and/or device operations. In some instances, a device characterizes a stimulus sensed at the device or an operation of a component of the device. A determination is made that a failure-risk condition is satisfied based on the characterization. In response to determining that the failure-risk condition is satisfied, the device initiates a data backing up of data in a non-volatile reserved memory or facilitates transmission of an alert communication from the device to another device.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: May 24, 2016
    Assignee: Belkin International Inc.
    Inventor: Ryan Yong Kim