Patents by Inventor Trieu C. Chieu
Trieu C. Chieu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120197942Abstract: Illustrative embodiments disclose a computer process controlling access to one or more documents by one or more parties, the parties organized over one or more organizations. In response to a party associated with a first organization attempting to access documents, determining an access level associated with the party as a first access level, a second access level, a third access level, or a fourth access level. The first, second, third and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. In response to determining the access level associated with the party, permitting the party to access the documents, or preventing the party from accessing the documents, according to the access level associated with the party.Type: ApplicationFiled: April 10, 2012Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh Hue Lam, Thao Ngoc Nguyen, Kakan Roy, Amit Jaysukhial Shah
-
Patent number: 7836314Abstract: A method, system and computer readable medium for maximizing the performance of a computer system that includes at least one computing unit. Temperature and location data for each computing unit is received by a server unit and the location of each computing unit within a given environment is reevaluated and revised to maximize the overall performance of the computer system.Type: GrantFiled: August 21, 2006Date of Patent: November 16, 2010Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Hoi Y. Chan, Vinod Kamath, Lawrence S. Mok
-
Publication number: 20100010974Abstract: A correlation-based service mediator consists of Semantic Query Generator, Service Query Manager, Service Invocation Flow Generator, Service Invocation Manager, Expression Interpreter and Service Invocation Result Cache. The Semantic Query Generator handles service requests. It generates Semantic Query statements. Basically, the generator converts service request to Semantic Query based on input/output parameters in the service request. The Service Query Manager interfaces with an Ontology Engine, in order to execute the semantic queries. It will pass the query results to Service Invocation Flow Generator. The Service Invocation Flow Generator creates service invocation flow definition based on query results passed from Service Query Manager. The Service Invocation Manager executes the flow definitions. It also manages a service invocation result cache, so that invocation results can be saved and reused for later service request.Type: ApplicationFiled: July 9, 2008Publication date: January 14, 2010Applicant: International Business Machines CorporationInventors: Trieu C. Chieu, Hui Lei, Guo Tong Xie, Liangzhao Zeng
-
Publication number: 20090228311Abstract: Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. Second, access can be controlled in accordance with access levels associated with the parties. The access level of each party is one of a first access level, a second access level, a third access level, or a fourth access level. The first, second, third, and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. Third, access can be controlled in accordance with placement of organizations within a hierarchy of organizations, where the parties are organized over the organizations.Type: ApplicationFiled: March 5, 2008Publication date: September 10, 2009Inventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh Hue Lam, Thao Ngoc Nguyen, Kakan Roy, Amit Jaysukhlal Shah
-
Patent number: 7570179Abstract: A wireless key is signal, having a key-specific identifier, is received, the key-specific identifier detected, and the signal transmission location is calculated. The signal transmission location is stored based on the detected key-specific identifier. Another instance of the same wireless key signal is received, its key-specific identifier is detected, and the stored signal transmission location is retrieved based on the detected key-specific identifier. Optionally, a wireless key signal is received at a user and repeated at a plurality of locations in a parking facility. A vehicle response is detected, and associated with one of the repeatings of the wireless key signal. A location of the vehicle response is detected based on the repeating with which it is associated.Type: GrantFiled: January 5, 2007Date of Patent: August 4, 2009Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, David L. Cohn, Shiwa S. Fu, Santhosh Kumaran, Lawrence S. Mok
-
Publication number: 20090106271Abstract: An enterprise content management system such as an electronic contract system manages a large number of secure documents for many organizations. The search of these private documents for different organizational users with role-based access control is a challenging task. A content-based extensible mark-up language (XML)-annotated secure-index search mechanism is provided that provides an effective search and retrieval of private documents with document-level security. The search mechanism includes a document analysis framework for text analysis and annotation, a search indexer to build and incorporate document access control information directly into a search index, an XML-based search engine, and a compound query generation technique to join user role and organization information into search query.Type: ApplicationFiled: October 19, 2007Publication date: April 23, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Trieu C. Chieu, Thao N. Nguyen, Liangzhao Zeng
-
Patent number: 7487494Abstract: The present invention is directed to systems and methods that treat the monitoring of a software application as a separate and independent concern from the software application itself. The present invention utilizes aspect oriented programming to intercept, analyze, decompose the application states of a software application and then to link appropriate non-invasive constructs into the software application code to provide application state information to an autonomic manager through a plurality of sensors. The autonomic manager analyzes the application state information for compliance pre-defined parameters, and takes appropriate corrective action including modifying the software application states using a plurality of effectors. The sensors and effectors are linked as non-invasive constructs to the software application, and in aspect oriented programming constitute aspects.Type: GrantFiled: August 2, 2004Date of Patent: February 3, 2009Assignee: International Business Machines CorporationInventors: Hoi Yeung Chan, Trieu C Chieu, Jeffrey Owen Kephart
-
Patent number: 7475152Abstract: The present invention utilizes agents embedded in content delivered to clients across a network to provide client-side security for the data delivered to a client. These embedded agents provide application-specific protection for the delivered content in which they are embedded and eliminate the need for using plug-ins for security functions. Different agents, e.g. programs such as Java applets, are configured having a variety of different client or application specific protection mechanisms, and the agents are dynamically configured, e.g. selected, in accordance with the application, the client to be protected or other environment criteria. Once the agent has been appropriately configured, the agent is embedded in the content, and the content is delivered to the client. Once delivered, the embedded agent is uploaded to the client and executed, providing the configured security protection at the client side for the content in which it was embedded.Type: GrantFiled: September 20, 2004Date of Patent: January 6, 2009Assignee: International Business Machines CorporationInventors: Hoi Yeung Chan, Trieu C Chieu
-
Publication number: 20080183528Abstract: An intelligent business event adapter receives information technology (IT) events and raw data from a backend enterprise application to capture, analyze, transform, enrich, aggregate, and correlate application-dependent IT-level events into a business level event which is communicated to a business performance monitoring (BPM) server. The adapter comprises four modules: an Event Adaptation module, a business rules module, a data retriever module, and a data transformation module. The Event Adaptation module captures and analyzes IT events from the backend enterprise application. The business rules module stores business rules. The data retriever module is invoked by the Event Adaptation module to obtain business data according to business rules stored in the business rules module. The data transformation module forms business events to be forwarded to the BPM server.Type: ApplicationFiled: March 28, 2008Publication date: July 31, 2008Inventors: Trieu C. Chieu, Shiwa S. Fu, Santhosh Kumaran, Jih-Shyr Yih
-
Publication number: 20080165033Abstract: A wireless key is signal, having a key-specific identifier, is received, the key-specific identifier detected, and the signal transmission location is calculated. The signal transmission location is stored based on the detected key-specific identifier. Another instance of the same wireless key signal is received, its key-specific identifier is detected, and the stored signal transmission location is retrieved based on the detected key-specific identifier. Optionally, a wireless key signal is received at a user and repeated at a plurality of locations in a parking facility. A vehicle response is detected, and associated with one of the repeatings of the wireless key signal. A location of the vehicle response is detected based on the repeating with which it is associated.Type: ApplicationFiled: January 5, 2007Publication date: July 10, 2008Inventors: Trieu C. Chieu, David L. Cohn, Shiwa S. Fu, Santhosh Kumaran, Lawrence S. Mok
-
Publication number: 20080046766Abstract: A method, system and computer readable medium for maximizing the performance of a computer system that includes at least one computing unit. Temperature and location data for each computing unit is received by a server unit and the location of each computing unit within a given environment is reevaluated and revised to maximize the overall performance of the computer system.Type: ApplicationFiled: August 21, 2006Publication date: February 21, 2008Applicant: International Business Machines CorporationInventors: Trieu C. Chieu, Hoi Y. Chan, Vinod Kamath, Lawrence S. Mok
-
Publication number: 20040215548Abstract: Under the present invention, a user can enter bids for multiple electronic auctions simultaneously (e.g., from a single web page). Specifically, a user can select multiple auctions from a group of auctions. Once selected, the auctions will be presented to the user on a gallery web page. Using the gallery web page, the user can then enter bids for any of the selected auctions. After being entered, the bids will be submitted to the corresponding auctions. Thereafter, real-time results of the auctions will be presented to the user on a result web page.Type: ApplicationFiled: April 22, 2003Publication date: October 28, 2004Applicant: International Business Machines CorporationInventors: Trieu C. Chieu, Aaron A. Guse
-
Patent number: 6593845Abstract: An active RF transponder is provided with a wake-up circuit that wakes the RF transponder from a sleep state upon detection of an RF interrogating signal. The active RF transponder includes a battery, an antenna adapted to receive RF signals from an interrogator, and electronic circuitry providing the various RF transponder functions of sending/receiving signals and storing data. A first embodiment of the invention includes a wake-up circuit that periodically checks for the presence of an RF signal at the antenna. The wake-up circuit is coupled to the antenna and includes a switch adapted to selectively couple the battery to the electronic circuitry and provide electrical power thereto upon detection of the RF signals by the antenna. The wake-up circuit further comprises an oscillator providing a clock signal having a low duty cycle that defines intervals during which the antenna is sampled for presence of the RF signals (e.g., approximately 20 ns every 100 &mgr;s).Type: GrantFiled: September 29, 1999Date of Patent: July 15, 2003Assignee: Intermac IP Corp.Inventors: Daniel J. Friedman, Thomas Anthony Cofino, Trieu C. Chieu
-
Patent number: 6501807Abstract: An RF/ID interrogator is provided for recovering a data signal from an RF/ID tag. The interrogator includes a radio having a receiver portion to receive in-phase (I) and quadrature-phase (Q) signals from the RF/ID transponder transmitted at a predetermined bit-rate, and a processor coupled to the radio for controlling operation of the radio in accordance with stored program instructions. In one embodiment, the interrogator performs over-sampling of the data signal received from the RF/ID tag in order to provide a high data recovery rate. The processor controls the over-sampling of the I and Q signals at a sampling rate higher than the transmitted bit-rate of the I and Q signals to provide plural signal samples that are stored in a buffer memory. The processor compares the relative polarity of successive ones of the plural signal samples.Type: GrantFiled: April 20, 1999Date of Patent: December 31, 2002Assignee: Intermec IP Corp.Inventors: Trieu C. Chieu, Li-Cheng Zai
-
Publication number: 20020073646Abstract: A system for processing containers, includes a sensor for sensing contents of a closed container, an identifier applicator for applying, based on an output of the sensor, a predetermined identifier to the container, a controller for controlling the sensor and the identifier applicator, and a read-out device for reading the identifier and communicating a result of read-out of the identifier to the controller.Type: ApplicationFiled: January 21, 1999Publication date: June 20, 2002Inventors: ROBERT J. VON GUTFELD, PAUL A. MOSKOWITZ, TRIEU C. CHIEU
-
Radio frequency identification interrogator signal processing system for reading moving transponders
Patent number: 6122329Abstract: An RF/ID interrogator recovers a backscattered data signal from a moving RF/ID transponder by combining the received in-phase (I) and quadrature-phase (Q) components of the signal in a manner that cancels out the amplitude nulls and phase reversals caused by movement of the RF/ID transponder. More particularly, the RF/ID interrogator comprises a radio having a transmitter portion to provide an RF carrier signal and a receiver portion to receive the I and Q signals from the RF transponder. A bandpass filter is coupled to the radio to remove direct current (DC) components from the I and Q. A processor coupled to the radio and the filter executes stored instructions to combine the filtered I and Q signals and recover the original backscattered data signal therefrom. In an embodiment of the invention, the processor estimates a phase angle .beta.(t) between the I and Q signals and the RF carrier by calculating an arctangent of a ratio of the filtered Q and I signals.Type: GrantFiled: September 15, 1998Date of Patent: September 19, 2000Assignee: Intermec IP Corp.Inventors: Li-Cheng Zai, Trieu C. Chieu -
Patent number: 5515366Abstract: Direct communication between a primary portable unit initiating the communication and a secondary portable unit is established utilizing two handshaking operations. The first handshaking operation is performed in the base station channel to establish initial contact between the primary and secondary portable units. After initial contact is made, the second handshaking operation is performed to establish communication in an unoccupied channel. The base station channel and the unoccupied channel may be a TDMA/TDD channel or a TDMA/FDD channel.Type: GrantFiled: November 17, 1994Date of Patent: May 7, 1996Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Anand Narasimhan, Gary E. O'Neil, Li-Cheng R. Zai