Patents by Inventor Stephen Chow
Stephen Chow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240102565Abstract: Bypass valves for pool heaters are disclosed. Embodiments may include pool heaters with a heat exchanger, a support, and an automatic bypass valve coupled to the support. The automatic bypass valve may include a cylindrical bypass shaft, and a bypass valve having a non-circular opening configured to receive the bypass shaft, where the bypass valve is configured to slide along the cylindrical bypass shaft responsive to water pressure in the heat exchanger, and where water and debris can flow through the non-circular opening when the bypass valve is in a closed position.Type: ApplicationFiled: September 14, 2023Publication date: March 28, 2024Inventors: Ryan Joseph Valencia, Alexander Stephen Chow
-
Patent number: 11671856Abstract: There is provided a method of evaluating user churn in wireless networks. The method includes receiving data from a plurality of wireless electronic devices connected to and operating in a plurality wireless networks and/or network types, wherein the data has been collected for each wireless electronic device by wireless device software embedded in an application or memory of the respective wireless electronic device and configured to collect the data when the wireless electronic device accesses one or more of the plurality of wireless networks and/or network types, and wherein the data comprises one or more identifiers associated with the wireless electronic device or a user of the wireless electronic device.Type: GrantFiled: November 17, 2020Date of Patent: June 6, 2023Assignee: Tutela Technologies Ltd.Inventors: Brennen Stephen Chow, Hunter Banford Bulmer MacDonald, David Daniel Yarish, Anthony Sean Kroeker, Stephen William Neville, Thomas E. Darcie
-
Publication number: 20210076237Abstract: There is provided a method of evaluating user churn in wireless networks. The method includes receiving data from a plurality of wireless electronic devices connected to and operating in a plurality wireless networks and/or network types, wherein the data has been collected for each wireless electronic device by wireless device software embedded in an application or memory of the respective wireless electronic device and configured to collect the data when the wireless electronic device accesses one or more of the plurality of wireless networks and/or network types, and wherein the data comprises one or more identifiers associated with the wireless electronic device or a user of the wireless electronic device.Type: ApplicationFiled: November 17, 2020Publication date: March 11, 2021Applicant: Tutela Technologies Ltd.Inventors: Brennen Stephen CHOW, Hunter Banford Bulmer MACDONALD, David Daniel YARISH, Anthony Sean KROEKER, Stephen William NEVILLE, Thomas E. DARCIE
-
Publication number: 20210006993Abstract: There is provided a system and method of evaluating wireless device and/or wireless network performance and/or user experience, on a wireless electronic device.Type: ApplicationFiled: September 10, 2020Publication date: January 7, 2021Applicant: Tutela Technologies Ltd.Inventors: Brennen Stephen Chow, Hunter Banford Bulmer MacDonald, David Daniel Yarish, Anthony Sean Kroeker, Stephen William Neville, Thomas E. Darcie
-
Patent number: 10827371Abstract: There is provided a method of evaluating wireless device performance, and/or wireless network performance, and/or wireless network usage trends, on a wireless electronic device, the method comprising: providing wireless device software on the wireless electronic device, the wireless device software being embedded in an application or memory of the wireless electronic device, and being operable to perform at least one test associated with characteristics and/or location of the device, and/or performance of the device and/or the network, and/or usage of the device by a user; communicating with at least one of: i) an operating system of the wireless electronic device and ii) an external testing server to perform the at least one test, wherein the at least one test is performed according to at least one testing parameter provided in a configuration and/or the wireless device software, the at least one testing parameter comprising at least one behavioural criterion that controls the impact of the testing on the opType: GrantFiled: January 16, 2018Date of Patent: November 3, 2020Assignee: Tutela Technologies Ltd.Inventors: Brennen Stephen Chow, Hunter Banford Bulmer MacDonald, David Daniel Yarish, Anthony Sean Kroeker, Stephen William Neville, Thomas E. Darcie
-
Patent number: 10819613Abstract: There is provided a method of controlling behaviour of a system that evaluates wireless device performance, and/or wireless network performance, and/or wireless network usage trends.Type: GrantFiled: January 16, 2018Date of Patent: October 27, 2020Assignee: Tutela Technologies Ltd.Inventors: Brennen Stephen Chow, Hunter Banford Bulmer MacDonald, David Daniel Yarish, Anthony Sean Kroeker, Stephen William Neville, Thomas E. Darcie
-
Patent number: 10778560Abstract: There is provided a method of controlling behaviour of a system that evaluates wireless device performance, and/or wireless network performance, and/or wireless network usage trends.Type: GrantFiled: January 16, 2018Date of Patent: September 15, 2020Assignee: Tutela Technologies Ltd.Inventors: Brennen Stephen Chow, Hunter Banford Bulmer MacDonald, David Daniel Yarish, Anthony Sean Kroeker, Stephen William Neville, Thomas E. Darcie
-
Patent number: 10667154Abstract: There is provided a method of evaluating wireless device and/or wireless network performance and/or wireless network usage trends. The method comprises providing wireless device software to each of a plurality of wireless electronic devices connected to one or more of a plurality of networks by having the wireless device software embedded in the corresponding electronic device, wherein the wireless device software is embedded in or operable with a plurality of types of applications and performs at least one test associated with characteristics and/or location of the device, and/or performance of the device and/or the network, and/or usage of the device by a user; receiving via one or more collection servers, test data obtained by the wireless device software of each of the plurality of wireless electronic devices; aggregating the received data; and storing and outputting the aggregated data.Type: GrantFiled: January 16, 2018Date of Patent: May 26, 2020Assignee: Tutela Technologies Ltd.Inventors: Brennen Stephen Chow, Hunter Banford Bulmer Macdonald, David Daniel Yarish, Anthony Sean Kroeker, Stephen William Neville, Thomas E. Darcie
-
Patent number: 10593216Abstract: Embodiments for managing drones by one or more processors are described. A first aerial drone having a payload coupled thereto is controlled such that the first aerial drone travels from a first location to a second location. A second aerial drone is controlled such that the second aerial drone travels to the second location. While the first aerial drone and the second aerial drone are in flight at the second location, the payload is detached from the first aerial drone and coupled to the second aerial drone. After the payload is detached from the first aerial drone and while the payload is coupled to the second aerial drone, the second aerial drone is controlled such that the second aerial drone travels from the second location to a third location.Type: GrantFiled: March 22, 2017Date of Patent: March 17, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Patent number: 10254755Abstract: Embodiments for managing drones by one or more processors are described. Information about each of a plurality of drones is received. Each of the plurality of drones is associated with a respective one of a plurality of users. A request to transport an item from an origination point to a destination is received. Based on the information about the plurality of drones, the origination point, and the destination, a first of the plurality of drones is selected to transport the item from the origination point to an intermediate region. Based on the information about the plurality of drones, the origination point, and the destination, a second of the plurality of drones is selected to transport the item from the intermediate region to the destination.Type: GrantFiled: January 9, 2017Date of Patent: April 9, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Publication number: 20180276993Abstract: Embodiments for managing drones by one or more processors are described. A first aerial drone having a payload coupled thereto is controlled such that the first aerial drone travels from a first location to a second location. A second aerial drone is controlled such that the second aerial drone travels to the second location. While the first aerial drone and the second aerial drone are in flight at the second location, the payload is detached from the first aerial drone and coupled to the second aerial drone. After the payload is detached from the first aerial drone and while the payload is coupled to the second aerial drone, the second aerial drone is controlled such that the second aerial drone travels from the second location to a third location.Type: ApplicationFiled: March 22, 2017Publication date: September 27, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen CHOW, Grant D. MILLER, Nader M. NASSAR, Richard J. NEWHOOK, Erich D. WALLS
-
Publication number: 20180206135Abstract: There is provided a method of evaluating wireless device and/or wireless network performance and/or wireless network usage trends. The method comprises providing wireless device software to each of a plurality of wireless electronic devices connected to one or more of a plurality of networks by having the wireless device software embedded in the corresponding electronic device, wherein the wireless device software is embedded in or operable with a plurality of types of applications and performs at least one test associated with characteristics and/or location of the device, and/or performance of the device and/or the network, and/or usage of the device by a user; receiving via one or more collection servers, test data obtained by the wireless device software of each of the plurality of wireless electronic devices; aggregating the received data; and storing and outputting the aggregated data.Type: ApplicationFiled: January 16, 2018Publication date: July 19, 2018Inventors: Brennen Stephen CHOW, Hunter Banford Bulmer MACDONALD, David Daniel YARISH, Anthony Sean KROEKER, Stephen William NEVILLE, Thomas E. DARCIE
-
Publication number: 20180206136Abstract: There is provided a method of evaluating wireless device performance, and/or wireless network performance, and/or wireless network usage trends, on a wireless electronic device, the method comprising: providing wireless device software on the wireless electronic device, the wireless device software being embedded in an application or memory of the wireless electronic device, and being operable to perform at least one test associated with characteristics and/or location of the device, and/or performance of the device and/or the network, and/or usage of the device by a user; communicating with at least one of: i) an operating system of the wireless electronic device and ii) an external testing server to perform the at least one test, wherein the at least one test is performed according to at least one testing parameter provided in a configuration and/or the wireless device software, the at least one testing parameter comprising at least one behavioural criterion that controls the impact of the testing on the opType: ApplicationFiled: January 16, 2018Publication date: July 19, 2018Inventors: Brennen Stephen Chow, Hunter Banford Bulmer MacDonald, David Daniel Yarish, Anthony Sean Kroeker, Stephen William Neville, Thomas E. Darcie
-
Publication number: 20180205631Abstract: There is provided a method of controlling behaviour of a system that evaluates wireless device performance, and/or wireless network performance, and/or wireless network usage trends.Type: ApplicationFiled: January 16, 2018Publication date: July 19, 2018Inventors: Brennen Stephen CHOW, Hunter Banford Bulmer MACDONALD, David Daniel YARISH, Anthony Sean KROEKER, Stephen William NEVILLE, Thomas E. DARCIE
-
Publication number: 20180196422Abstract: Embodiments for managing drones by one or more processors are described. Information about each of a plurality of drones is received. Each of the plurality of drones is associated with a respective one of a plurality of users. A request to transport an item from an origination point to a destination is received. Based on the information about the plurality of drones, the origination point, and the destination, a first of the plurality of drones is selected to transport the item from the origination point to an intermediate region. Based on the information about the plurality of drones, the origination point, and the destination, a second of the plurality of drones is selected to transport the item from the intermediate region to the destination.Type: ApplicationFiled: January 9, 2017Publication date: July 12, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen CHOW, Grant D. MILLER, Nader M. NASSAR, Richard J. NEWHOOK, Erich D. WALLS
-
Patent number: 9887842Abstract: According to one embodiment, a method for binding an application bundle. The method includes receiving a download request for an application bundle. The method also includes retrieving the application bundle from a master data store within an application store. The method further includes encrypting the retrieved application bundle based on a device specific encryption key associated with a device. The method also includes transmitting the encrypted application bundle to the device. The method further includes receiving an execution request for the transmitted application bundle. The method also includes decrypting the transmitted application bundle based on a device specific decryption key associated with the device. The method further includes sending the decrypted application bundle to an execution interface.Type: GrantFiled: June 30, 2015Date of Patent: February 6, 2018Assignee: International Business Machines CorporationInventors: Stephen Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Patent number: 9882959Abstract: In an approach to managing requests to a high utilization website, one or more computer processors receive a first resource usage load status from a first server computer. The one or more computer processors receive a request for content on the first server computer from a client. The one or more computer processors determine whether the first resource usage load is above a pre-defined threshold. Responsive to determining the first resource usage load is above the pre-defined threshold, the one or more computer processors create a queue of a plurality of content requesters, wherein the client is one of the plurality of content requesters. The one or more computer processors establish a bidirectional communication channel with the client.Type: GrantFiled: September 30, 2014Date of Patent: January 30, 2018Assignee: International Business Machines CorporationInventors: Stephen Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich Walls
-
Publication number: 20170005798Abstract: According to one embodiment, a method for binding an application bundle. The method includes receiving a download request for an application bundle. The method also includes retrieving the application bundle from a master data store within an application store. The method further includes encrypting the retrieved application bundle based on a device specific encryption key associated with a device. The method also includes transmitting the encrypted application bundle to the device. The method further includes receiving an execution request for the transmitted application bundle. The method also includes decrypting the transmitted application bundle based on a device specific decryption key associated with the device. The method further includes sending the decrypted application bundle to an execution interface.Type: ApplicationFiled: June 30, 2015Publication date: January 5, 2017Inventors: Stephen Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Publication number: 20160094611Abstract: In an approach to managing requests to a high utilization website, one or more computer processors receive a first resource usage load status from a first server computer. The one or more computer processors receive a request for content on the first server computer from a client. The one or more computer processors determine whether the first resource usage load is above a pre-defined threshold. Responsive to determining the first resource usage load is above the pre-defined threshold, the one or more computer processors create a queue of a plurality of content requesters, wherein the client is one of the plurality of content requesters. The one or more computer processors establish a bidirectional communication channel with the client.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: Stephen Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich Walls
-
Publication number: 20160087978Abstract: A method including a computer device receiving a first authentication input from at least one user to start a multi-layered security protocol; the computer device receiving secondary authentication inputs from the at least one user to continue the multi-layered security protocol to determine if a security protocol has been met, wherein the secondary authentication inputs include receiving a first feature input from the at least one user and receiving a second feature from the at least one user; and the computer device determining if the first and secondary authentication inputs pass or fail the multi-layered security protocol.Type: ApplicationFiled: September 23, 2014Publication date: March 24, 2016Inventors: Stephen Chow, Grant Douglas Miller, Nader M. Nassar, Richard John Newhook, Erich Walls