Patents by Inventor Victor Tan
Victor Tan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240093199Abstract: The invention relates to a double-stranded ribonucleic acid (dsRNA) for inhibiting the expression of the PCSK9 gene (PCSK9 gene), comprising an antisense strand having a nucleotide sequence which is less that 30 nucleotides in length, generally 19-25 nucleotides in length, and which is substantially complementary to at least a part of the PCSK9 gene. The invention also relates to a pharmaceutical composition comprising the dsRNA together with a pharmaceutically acceptable carrier and method for treating diseases caused by PCSK9 gene expression.Type: ApplicationFiled: March 3, 2023Publication date: March 21, 2024Inventors: Pamela Tan, Birgit Bramlage, Maria Frank-Kamenetsky, Kevin Fitzgerald, Akin Akinc, Victor E. Kotelianski
-
Publication number: 20230334689Abstract: Provided herein is a method for reconstructing a three-dimensional projectile trajectory for a projectile object using one or more image capture devices and a projectile trajectory model. Systems and computer program products using the method are also described.Type: ApplicationFiled: April 19, 2022Publication date: October 19, 2023Inventors: Ernest CHEN, Victor TAN
-
Patent number: 11048943Abstract: A method includes generating, with a mobile device having a camera, images of a portion of a real space containing an object having a position. The control device tracks the position of the object based at least on the images received from the mobile device. The control device monitors the position of the object for an event conforming to a rule specified at the control device. The event is based on the rule and the position of the object in the real space. The control device, or a client device, generates an indication that the event has been detected by the control device.Type: GrantFiled: September 30, 2019Date of Patent: June 29, 2021Assignee: Infinity Cube Ltd.Inventors: Kin Yu Ernest Chen, Geok Hong Victor Tan, Lik Fai Alex Cheung
-
Publication number: 20200034628Abstract: A method includes generating, with a mobile device having a camera, images of a portion of a real space containing an object having a position. The control device tracks the position of the object based at least on the images received from the mobile device. The control device monitors the position of the object for an event conforming to a rule specified at the control device. The event is based on the rule and the position of the object in the real space. The control device, or a client device, generates an indication that the event has been detected by the control device.Type: ApplicationFiled: September 30, 2019Publication date: January 30, 2020Inventors: Kin Yu Ernest Chen, Geok Hong Victor Tan, Lik Fai Alex Cheung
-
Patent number: 10467478Abstract: A method includes generating, with a mobile device having a camera, images of a portion of a real space containing an object having a position. The control device tracks the position of the object based at least on the images received from the mobile device. The control device monitors the position of the object for an event conforming to a rule specified at the control device. The event is based on the rule and the position of the object in the real space. The control device, or a client device, generates an indication that the event has been detected by the control device.Type: GrantFiled: April 6, 2017Date of Patent: November 5, 2019Assignee: Infinity Cube LimitedInventors: Kin Yu Ernest Chen, Geok Hong Victor Tan, Lik Fai Alex Cheung
-
Patent number: 10331891Abstract: Embodiments related to conducting and constructing a secure start-up process are disclosed. One embodiment provides, on a computing device, a method of conducting a secure start-up process. The method comprises recognizing the branch instruction, and, in response, calculating an integrity datum of a data segment. The method further comprises obtaining an adjustment datum, and computing a branch target address based on the integrity datum and the adjustment datum.Type: GrantFiled: February 6, 2012Date of Patent: June 25, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventor: Victor Tan
-
Patent number: 9813403Abstract: Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated using a trusted location. The authenticated enhanced media platform establishes a bidirectional trust with an enhanced remote location, the enhanced media platform being stored in the enhanced remote location. Upon authentication and establishing the bidirectional trust, the enhanced media platform may securely communicate media content in a media content distribution service infrastructure while supporting custom functionality. The method for securing communications with enhanced media platforms includes communicating authentication credentials to an internal security component at the trusted location. The method further includes receiving validation credentials from the internal security component. The method also includes authenticating the enhanced remote location based on at least a portion of the validation credentials received.Type: GrantFiled: July 19, 2016Date of Patent: November 7, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Jean-Emile Elien, Daniel Collins Balma, Rocco Crea, III, Michael Brendan Frei, Paul Stephen Hellyar, Victor Tan, Kye Hyun Kim, Travis J. Muhlestein, Robert S. Unoki, Kenneth Michael Bayer, Wes Wahlin
-
Publication number: 20170213087Abstract: A method includes generating, with a mobile device having a camera, images of a portion of a real space containing an object having a position. The control device tracks the position of the object based at least on the images received from the mobile device. The control device monitors the position of the object for an event conforming to a rule specified at the control device. The event is based on the rule and the position of the object in the real space. The control device, or a client device, generates an indication that the event has been detected by the control device.Type: ApplicationFiled: April 6, 2017Publication date: July 27, 2017Inventors: Kin Yu Ernest Chen, Geok Hong Victor Tan, Lik Fai Alex Cheung
-
Patent number: 9647847Abstract: Various techniques are described to protect secrets held by closed computing devices. In an ecosystem where devices operate and are offered a wide range of services from a service provider, the service provider may want to prevent users from sharing services between devices. In order to guarantee that services are not shared between devices, each device can be manufactured with a different set of secrets such as per device identifiers. Unscrupulous individuals may try to gain access to the secrets and transfer secrets from one device to another. In order to prevent this type of attack, each closed computing system can be manufactured to include a protected memory location that is tied to the device.Type: GrantFiled: January 8, 2016Date of Patent: May 9, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Sebastian Lange, Victor Tan, Adam G. Poulos
-
Publication number: 20160330188Abstract: Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated using a trusted location. The authenticated enhanced media platform establishes a bidirectional trust with an enhanced remote location, the enhanced media platform being stored in the enhanced remote location. Upon authentication and establishing the bidirectional trust, the enhanced media platform may securely communicate media content in a media content distribution service infrastructure while supporting custom functionality. The method for securing communications with enhanced media platforms includes communicating authentication credentials to an internal security component at the trusted location. The method further includes receiving validation credentials from the internal security component. The method also includes authenticating the enhanced remote location based on at least a portion of the validation credentials received.Type: ApplicationFiled: July 19, 2016Publication date: November 10, 2016Inventors: Jean-Emile Elien, Daniel Collins Balma, Rocco Crea, III, Michael Brendan Frei, Paul Stephen Hellyar, Victor Tan, Kye Hyun Kim, Travis J. Muhlestein, Robert S. Unoki, Kenneth Michael Bayer, Wes Wahlin
-
Patent number: 9413738Abstract: Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated using a trusted location. The authenticated enhanced media platform establishes a bidirectional trust with an enhanced remote location, the enhanced media platform being stored in the enhanced remote location. Upon authentication and establishing the bidirectional trust, the enhanced media platform may securely communicate media content in a media content distribution service infrastructure while supporting custom functionality. The method for securing communications with enhanced media platforms includes communicating authentication credentials to an internal security component at the trusted location. The method further includes receiving validation credentials from the internal security component. The method also includes authenticating the enhanced remote location based on at least a portion of the validation credentials received.Type: GrantFiled: June 19, 2014Date of Patent: August 9, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Jean-Emile Elien, Daniel Collins Balma, Rocco Crea, III, Michael Brendan Frei, Paul Stephen Hellyar, Victor Tan, Kye Hyun Kim, Travis J. Muhlestein, Robert S. Unoki, Kenneth Michael Bayer, Wes Wahlin
-
Publication number: 20160204945Abstract: Various techniques are described to protect secrets held by closed computing devices. In an ecosystem where devices operate and are offered a wide range of services from a service provider, the service provider may want to prevent users from sharing services between devices. In order to guarantee that services are not shared between devices, each device can be manufactured with a different set of secrets such as per device identifiers. Unscrupulous individuals may try to gain access to the secrets and transfer secrets from one device to another. In order to prevent this type of attack, each closed computing system can be manufactured to include a protected memory location that is tied to the device.Type: ApplicationFiled: January 8, 2016Publication date: July 14, 2016Inventors: Sebastian Lange, Victor Tan, Adam G. Poulos
-
Patent number: 9262594Abstract: Various techniques are described to protect secrets held by closed computing devices. In an ecosystem where devices operate and are offered a wide range of services from a service provider, the service provider may want to prevent users from sharing services between devices. In order to guarantee that services are not shared between devices, each device can be manufactured with a different set of secrets such as per device identifiers. Unscrupulous individuals may try to gain access to the secrets and transfer secrets from one device to another. In order to prevent this type of attack, each closed computing system can be manufactured to include a protected memory location that is tied to the device.Type: GrantFiled: January 18, 2008Date of Patent: February 16, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Sebastian Lange, Victor Tan, Adam G. Poulos
-
Publication number: 20150372998Abstract: Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated using a trusted location. The authenticated enhanced media platform establishes a bidirectional trust with an enhanced remote location, the enhanced media platform being stored in the enhanced remote location. Upon authentication and establishing the bidirectional trust, the enhanced media platform may securely communicate media content in a media content distribution service infrastructure while supporting custom functionality. The method for securing communications with enhanced media platforms includes communicating authentication credentials to an internal security component at the trusted location. The method further includes receiving validation credentials from the internal security component. The method also includes authenticating the enhanced remote location based on at least a portion of the validation credentials received.Type: ApplicationFiled: June 19, 2014Publication date: December 24, 2015Inventors: JEAN-EMILE ELIEN, DANIEL COLLINS BALMA, ROCCO CREA, III, MICHAEL BRENDAN FREI, PAUL STEPHEN HELLYAR, VICTOR TAN, KYE HYUN KIM, TRAVIS J. MUHLESTEIN, ROBERT S. UNOKI, KENNETH MICHAEL BAYER, WES WAHLIN
-
Patent number: 8726042Abstract: Various mechanisms are disclosed for protecting the security of memory in a computing environment. A security layer can have an encryption layer and a hashing layer that can dynamically encrypt and then dynamically hash sensitive information, as it is being loaded to dynamic memory of a computing device. For example, a memory unit that can correspond to a memory page can be processed by the security layer, and header data, code, and protect-worthy data can be secured, while other non-sensitive data can be left alone. Once such information is secured and stored in dynamic memory, it can be accessed at a later time by a processor and unencrypted and hash checked. Then, it can be loaded back onto the dynamic memory, thereby preventing direct memory access attacks.Type: GrantFiled: February 29, 2008Date of Patent: May 13, 2014Assignee: Microsoft CorporationInventors: Sebastian Lange, Dinarte R. Morais, Victor Tan, Adam G. Poulos
-
Patent number: 8672231Abstract: A system for manufacturing an integrated circuit system having a substrate with a integrated circuit device. A first pad is formed on the substrate and connected to the integrated circuit device. A first dielectric layer is formed over the substrate and the first pad, with the first dielectric layer having an opening provided therein exposing the first pad. An upper redistribution layer is formed over the first dielectric layer. A portion of the upper redistribution layer is formed into an antenna with the antenna connected to the first pad. A second dielectric layer is formed over the first dielectric layer and over the antenna.Type: GrantFiled: September 22, 2008Date of Patent: March 18, 2014Assignee: GLOBALFOUNDRIES Singapore Pte. Ltd.Inventors: David Yeo, Victor Tan, Marvin Lo, Kai Keong Cheong, Stanley Bay, Anthony Yong
-
Patent number: 8661234Abstract: An individualized per device initialization of a computing device is unique relative to the initialization of other computing devices. A common initialization program, common to all computing devices of a particular type such as a game console, may be modified to be unique for each computing device. Modification may comprise the application of at least one individualized per device secret, e.g., key, to at least a portion of the common initialization program such as at least one initialization stage. Initialization is tied to one or more device specific identities. In this way, initialization vulnerabilities discovered on a particular device cannot be exploited en masse on other computing devices because each initialization program stored in each computing device is unique. The device specific nature of the initialization program may be extended to other information input to the computing device in order to prevent unauthorized sharing of information with other computing devices.Type: GrantFiled: January 31, 2008Date of Patent: February 25, 2014Assignee: Microsoft CorporationInventors: Sebastian Lange, Adam Gabriel Poulos, Victor Tan
-
Patent number: 8656190Abstract: A one-time-settable tamper resistant software repository may be used in any computing system to store system information such as security violations and policies for responding to them. A one-time-settable tamper resistant software repository may be cryptographically signed, encrypted with a per device key and accessible by only the most privileged software executed by a computing device, e.g., hypervisor or operating system kernel. A one-time-settable tamper resistant software repository may be mirrored in RAM for performance. Recordable event fields in a software repository may be one-time-settable without the ability to reset them in a field operation mode whereas they may be resettable in a different mode such as a manufacturing mode.Type: GrantFiled: January 31, 2008Date of Patent: February 18, 2014Assignee: Microsoft CorporationInventors: Sebastian Lange, Adam Gabriel Poulos, Victor Tan
-
Publication number: 20130205124Abstract: Embodiments related to conducting and constructing a secure start-up process are disclosed, One embodiment provides, on a computing device, a method of conducting a secure start-up process. The method comprises recognizing the branch instruction, and, in response, calculating an integrity datum of a data segment. The method further comprises obtaining an adjustment datum, and computing a branch target address based on the integrity datum and the adjustment datum.Type: ApplicationFiled: February 6, 2012Publication date: August 8, 2013Applicant: MICROSOFT CORPORATIONInventor: Victor Tan
-
Patent number: 8059137Abstract: A method and system for rendering a desktop on a computer using a composited desktop model operating system are disclosed. A composited desktop window manager, upon receiving content information from application programs, draws the window to a buffer memory for future reference, and takes advantage of advanced graphics hardware and visual effects to render windows based on content on which they are drawn. The windows may also be rendered based on environment variables including virtual light sources. The frame portion of each window may be generated by pixel shading a bitmap having the appearance of frosted glass based on the content of the desktop on top of which the frame is displayed. Legacy support is provided so that the operating system can draw and render windows generated by legacy applications to look consistent with non-legacy application windows.Type: GrantFiled: November 5, 2010Date of Patent: November 15, 2011Assignee: Microsoft CorporationInventors: Scott Hanggie, Victor Tan, Gerardo Bermudez, Gregory D. Swedberg, Mark Richard Ligameri, Greg Scott Melander