Patents by Inventor Tony Chen

Tony Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9530000
    Abstract: The subject disclosure is directed towards using one or more of hardware, a hypervisor, and privileged mode code to prevent system mode code from accessing user mode data and/or running user mode code at the system privilege level, or vice-versa. Also described is (in systems with a hypervisor) preventing non-hypervisor code from running in hypervisor mode or accessing hypervisor-only data, or vice-versa. A register maintained by hardware, hypervisor, or system mode code contains data access and execution polices for different chunks of addressable space with respect to which requesting entities (hypervisor mode code, system mode code, user mode code) have access to or can execute code in a given chunk. When a request to execute code or access data with respect to an address is received, the request is processed to determine to which chunk the address corresponds. The policy for that chunk is evaluated to determine whether to allow or deny the request.
    Type: Grant
    Filed: June 14, 2013
    Date of Patent: December 27, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jonathan E. Lange, John V. Sell, Ling Tony Chen, Eric O. Mejdrich
  • Publication number: 20160294790
    Abstract: When theft protection of a computing device is initiated, credentials of the user are provided to one or more services that verify the credentials and generate a recovery key. A data value is generated based on the recovery key and an identifier of the computing device (e.g., by applying a cryptographic hash function to the recovery key and the computing device identifier), and the data value is provided to the computing device, which stores the data value at the computing device. When a user is prompted to prove his or her ownership of the device, the owner can prove his or her ownership of the device in different manners by accessing the one or more services via a network (e.g., the Internet), or by providing the recovery key (e.g., obtained using another computing device) to the computing device.
    Type: Application
    Filed: June 8, 2015
    Publication date: October 6, 2016
    Inventors: Mihai Irinel Susan, Bogdan Andreiu, Scott R. Shell, Scott Michael Bragg, Ling Tony Chen
  • Patent number: 9454661
    Abstract: The subject disclosure is directed towards providing a computing device with access to key that depends on the current software version, e.g., the software version of a security processor. If the software is compromised, another key becomes available with release of each new (non-compromised) software version. Keys for future versions cannot be derived, while keys for earlier versions can be derived from the current key. A secure boot process uses a secret to generate a first key, after which access to the secret is turned off. The first key is used with key blob data to compute a second key used for data decryption (and encryption) as needed. The key blob data may be global for all devices, and/or device specific; a hash stick comprising a set of derivable keys may be used at manufacturing time to generate the device-specific key blob data.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: September 27, 2016
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ling Tony Chen, Felix Stefan Domke, Kenneth D. Ray
  • Publication number: 20160271624
    Abstract: Methods of enhancing recovery of value sulfide or precious minerals from an ore containing Mg-silicate, slime forming minerals, and/or clay by subjecting the ore to a flotation process performed under acidic conditions, in conjunction with the addition of a froth phase modifier agent to the ore, are provided herein.
    Type: Application
    Filed: May 26, 2016
    Publication date: September 22, 2016
    Applicant: Cytec Technology Corp.
    Inventors: Devarayasamudram Ramachandran NAGARAJ, Tarun BHAMBHANI, Mukund VASUDEVAN, Puspendu DEO, Haunn-Lin Tony CHEN
  • Patent number: 9401800
    Abstract: A clock data recovery system is provided. A CTLE generates a first equalized signal. An adder superposes the first equalized signal and a feedback equalization signal and generates a superposed signal. A first error slicer slices the superposed signal according to a clock signal and a reference voltage and generates a first error signal. A second error slicer slices the superposed signal according to the clock signal and a second slicing voltage. A data slicer slices the superposed signal according to the clock signal and a third slicing voltage and generates a data signal. A CDR circuit generates the clock signal. An adaptive filter receives the data signal and the first error signal, and generates the reference voltage and a DFE coefficient set. A DFE receives the data signal and the DFE coefficient set, and generates the feedback equalization signal.
    Type: Grant
    Filed: July 14, 2015
    Date of Patent: July 26, 2016
    Assignees: GLOBAL UNICHIP CORPORATION, TAIWAN SEMICONDUCTOR MANUFACTURING CO., LTD.
    Inventors: Wen-Juh Kang, Yen-Chung Tony Chen, Chen-Yang Pan
  • Publication number: 20160185613
    Abstract: The suspended solids content of a process stream in a process for producing alumina is reduced by contacting the stream with silicon-containing polymers provided by water-in-oil compositions.
    Type: Application
    Filed: February 7, 2011
    Publication date: June 30, 2016
    Applicant: CYTEC TECHNOLOGY CORP.
    Inventors: Haunn-Lin Tony Chen, Douglas A. Cywar, Matthew J. Davis, Morris Lewellyn
  • Publication number: 20160176995
    Abstract: Silicon containing polyamine scale inhibitors derived from poly(primary amine)s are disclosed. The scale inhibitors can be used to reduce siliceous scale formation in industrial process streams such as alumina recovery process streams, nuclear waste streams and kraft paper mill effluent streams.
    Type: Application
    Filed: December 15, 2015
    Publication date: June 23, 2016
    Applicant: Cytec Industries Inc
    Inventors: Airong Song, Lei Zhang, Douglas Cywar, Haunn-Lin Tony Chen, Matthew Taylor
  • Publication number: 20160171211
    Abstract: Return oriented programming (ROP) attack prevention techniques are described. In one or more examples, a method is described of protecting against return oriented programming attacks. The method includes initiating a compute signature hardware instruction of a computing device to compute a signature for a return address and the associated location on the stack the return address is stored and causing storage of the computed signature along with the return address in the stack. The method also includes enforcing that before executing the return instruction using the return address on the stack, initiating a verify signature hardware instruction of the computing device to verify the signature matches the target return address on the stack and responding to successful verification of the signature through execution of the verify signature hardware instruction by the computing device, executing the return instruction to the return address.
    Type: Application
    Filed: January 20, 2015
    Publication date: June 16, 2016
    Inventors: Ling Tony Chen, Jonathan E. Lange, Greg M. Zaverucha
  • Patent number: 9367543
    Abstract: Systems and method for providing a game achievements system where players are rewarded with game achievements based on mastering certain in-game facets of the games they play. Each game achievement may be conveyed in a profile as a badge or trophy, title, description, date, etc. Players may also accumulate points based on game achievements. A display interface may be made available such that a player may see his achievements and total points, as well as those of others.
    Type: Grant
    Filed: May 1, 2013
    Date of Patent: June 14, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Michal Bortnik, Vincent H. Curley, James Hsi-kai Jen, James David Macauley, Ling Tony Chen, Steven D. Lamb
  • Patent number: 9355097
    Abstract: Systems and method for providing a game achievements system where players are rewarded with game achievements based on mastering certain in-game facets of the games they play. Each game achievement may be conveyed in a profile as a badge or trophy, title, description, date, etc. Players may also accumulate points based on game achievements. A display interface may be made available such that a player may see his achievements and total points, as well as those of others.
    Type: Grant
    Filed: May 1, 2013
    Date of Patent: May 31, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Michal Bortnik, Vincent H. Curley, James Hsi-Kai Jen, James David Macauley, Ling Tony Chen, Steven D. Lamb
  • Publication number: 20160052807
    Abstract: The suspended solids content of a Bayer process stream is reduced by contacting the stream with silicon-containing polymers.
    Type: Application
    Filed: November 2, 2015
    Publication date: February 25, 2016
    Applicant: CYTEC TECHNOLOGY CORP.
    Inventors: Qi Dai, Donald Paul Spitzer, Howard I. Heitner, Huann-Lin Tony Chen
  • Publication number: 20150379270
    Abstract: The subject disclosure is directed towards providing a computing device with access to key that depends on the current software version, e.g., the software version of a security processor. If the software is compromised, another key becomes available with release of each new (non-compromised) software version. Keys for future versions cannot be derived, while keys for earlier versions can be derived from the current key. A secure boot process uses a secret to generate a first key, after which access to the secret is turned off. The first key is used with key blob data to compute a second key used for data decryption (and encryption) as needed. The key blob data may be global for all devices, and/or device specific; a hash stick comprising a set of derivable keys may be used at manufacturing time to generate the device-specific key blob data.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Inventors: Ling Tony Chen, Felix Stefan Domke, Kenneth D. Ray
  • Publication number: 20150371046
    Abstract: The subject disclosure is directed towards protecting code in memory from being modified after boot, such as code used in a dedicated microprocessor or microcontroller. Hardware, such as in logic or in a memory protection unit, allows a range of memory to be made non-writeable after being loaded, e.g., via a secure boot load operation. Further, startup code that is used to configure the hardware/memory may be made non-executable after having run once, so that no further execution may occur in that space, e.g., as a result of an attack. A function in the runtime code may allow for a limited, attack-protected reconfiguration of sub-regions of memory regions during the runtime execution.
    Type: Application
    Filed: June 20, 2014
    Publication date: December 24, 2015
    Inventors: Ling Tony Chen, Felix Stefan Domke
  • Patent number: 9144741
    Abstract: Systems and method for providing a single sign in a gaming console that associates online activity that is out-of-game/cross game, and/or online activity that is in-game, and/or activity that is offline and in-game with that account. While online, a service tracks activity of gamers and provides usage statistics in a profile. While offline, the game console tracks the player's activity via a mechanism to collect detailed information about a specific player's in-game statistics and accomplishments. The offline activity is cached and uploaded when the console connects to the online service. Players can accumulate achievements offline that are credited towards online activities.
    Type: Grant
    Filed: July 31, 2013
    Date of Patent: September 29, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Michal Bortnik, Erik John Arthur, James David Macauley, Ling Tony Chen, Yasser B. Asmi, Steven D. Lamb, James N. Helm
  • Publication number: 20150238870
    Abstract: Systems and method for providing a single sign in a gaming console that associates online activity that is out-of-game/cross game, and/or online activity that is in-game, and/or activity that is offline and in-game with that account. While online, a service tracks activity of gamers and provides usage statistics in a profile. While offline, the game console tracks the player's activity via a mechanism to collect detailed information about a specific player's in-game statistics and accomplishments. The offline activity is cached and uploaded when the console connects to the online service. Players can accumulate achievements offline that are credited towards online activities.
    Type: Application
    Filed: May 12, 2015
    Publication date: August 27, 2015
    Inventors: Michal Bortnik, Erik John Arthur, James David Macauley, Ling Tony Chen, Yasser B. Asmi, Steven D. Lamb, James N. Helm
  • Publication number: 20150225241
    Abstract: Processes for inhibiting scale produced during wet process phosphoric acid production by adding a scale-inhibiting amount of a reagent having a primary amine-containing polymer, or salt thereof, to one or more stages of a wet process phosphoric acid production stream are provided herein, wherein the primary amine-containing polymer includes an A mer according to Formula (I): where R is H, C1-C6 alkyl, C2-C6 alkenyl, halide, or carboxyl; R1 is H, C1-C6 alkyl, or C2-C6 alkenyl; R2 is H or an A mer according to Formula (I) as herein defined; R3 is chosen from a direct bond or a C1-C12 alkyl, C2-C12 alkenyl, or a C6-C12 aryl group; and n is an integer chosen to provide a weight average molecular weight of the primary amine-containing polymer of at least 300 Daltons, and wherein the percentage of primary amines in the polymer is from 30 mole % to 100 mole % based on the total percentage of mer units in the polymer.
    Type: Application
    Filed: February 11, 2015
    Publication date: August 13, 2015
    Inventors: Lei ZHANG, John CARR, Haunn-Lin Tony CHEN
  • Patent number: 9020215
    Abstract: A method is provided for detecting a corresponding region of interest in digital medical images, the method including receiving a plurality of digital images including a primary image, at least one of the images being a projective image, identifying anatomical landmarks and structures within each of the images and correlating the images based on the identified anatomical landmarks and structures identifying a location of interest in the primary image, and automatically identifying a region of interest in the rest of the images, the region of interest corresponding to the identified location of interest in the primary image.
    Type: Grant
    Filed: May 28, 2010
    Date of Patent: April 28, 2015
    Assignee: Siemens Medical Solutions USA, Inc.
    Inventors: Yuanhsi (Tony) Chen, Zhigang Peng, Venkat Raghavan Ramamurthy, Xiang Sean Zhou
  • Publication number: 20150095661
    Abstract: Regions of system memory in a computer system are managed to maintain privacy and integrity of data. A system address space for memory is divided into a plurality of aliased addressed spaces. Each of the aliased address spaces is associated with its own unique encryption key. The system address space is managed using the aliased address spaces to provide data isolation and privacy for different system processes. One or more aliased address spaces can be provided with additional data integrity capabilities. Data associated with an integrity-checked aliased address space is subjected to data integrity checking, using authentication-based techniques such as hashing, for example. Additionally, a set of contiguous addresses in the aliased address space is defined, while being mapped to a set of non-contiguous addresses in the corresponding physical address space for additional data security.
    Type: Application
    Filed: September 30, 2013
    Publication date: April 2, 2015
    Applicant: Microsoft Corporation
    Inventors: John V. Sell, Ling Tony Chen, Paul Paternoster
  • Publication number: 20150082420
    Abstract: A SoC includes multiple hardware modules that are implemented on a substrate. The hardware modules include a plurality of hardware and software security features and the SoC provides one or more external interfaces for accessing the security features. A validation module, implemented in the boot code of the SoC for example, manages security certificates to control access to the plurality of security features. Each security certificate includes one or more unique identifiers corresponding to one or more hardware modules in the SoC and access control settings for one or more security features of the one or more hardware modules. The security certificate additionally includes a certificate signature signed by a secure key.
    Type: Application
    Filed: September 13, 2013
    Publication date: March 19, 2015
    Applicant: Microsoft Corporation
    Inventors: Michael Love, Ling Tony Chen, Felix Domke, Kenneth Ray
  • Publication number: 20140372719
    Abstract: The subject disclosure is directed towards using one or more of hardware, a hypervisor, and privileged mode code to prevent system mode code from accessing user mode data and/or running user mode code at the system privilege level, or vice-versa. Also described is (in systems with a hypervisor) preventing non-hypervisor code from running in hypervisor mode or accessing hypervisor-only data, or vice-versa. A register maintained by hardware, hypervisor, or system mode code contains data access and execution polices for different chunks of addressable space with respect to which requesting entities (hypervisor mode code, system mode code, user mode code) have access to or can execute code in a given chunk. When a request to execute code or access data with respect to an address is received, the request is processed to determine to which chunk the address corresponds. The policy for that chunk is evaluated to determine whether to allow or deny the request.
    Type: Application
    Filed: June 14, 2013
    Publication date: December 18, 2014
    Inventors: Jonathan E. Lange, John V. Sell, Ling Tony Chen, Eric O. Mejdrich