George Koppich - Palos Verdes Estates CA Michael Lee Yeung - Mission Viejo CA Don Francis Purpura - Yorba Linda CA Paul Nicholas Gacek - Laguna Beach CA Tapani Otala - San Jose CA Douglas Richard Barr - Laguna Beach CA
Assignee:
Canon Kabushiki Kaisha - Tokyo
International Classification:
G06F 1300
US Classification:
358 115, 358 113
Abstract:
A software architecture for printing to a home printer via a cable television communication network includes complementary clients and servers executing on each of the internet components participating in the internet-based printing. A client executes at the remote internet-based site that originates the print job, and transmits the print job to a complimentary server at the cable head end. A server at the cable head end spools the print job and preferably converts the print job into a format more suitable for a next-downstream device, such as a cable set top box. The cable head end further includes a client which transmits the print job from the cable head ends server to a server at the set top box. The server at the set top box spools the print job to an attached printer. Preferably each of the clients and each of the servers is nearly identical to all other clients and servers, and each communicates to other applications including client applications through a consistent and uniform application programming interface.
There is provided asystem and architecture for accessing and communicating with digital image devices. The system is provided in the form of software components that are platform independent for the development of software for managing or controlling digital image devices. The software components are easily integrated with existing development tools, have native functionality, and can be implemented independently of Common Information Model or Simple Network Management Protocol architectures.
George Koppich - Palos Verdes Estates CA, US Michael Lee Yeung - Mission Viejo CA, US Don Francis Purpura - Yorba Linda CA, US Paul Nicholas Gacek - Laguna Beach CA, US Tapani Otala - San Jose CA, US Douglas Richard Barr - Laguna Beach CA, US
Internet-based printing to a home printer in which the print job is pre-rasterized at the cable head end and sent in rasterized format to the set top box. Because the print job is pre-rasterized at the cable head end, and not at the set top box, resources are not wasted at the set top box when they are more readily available at the cable head end. In addition, because of the high speed communication network already in existence between the cable head end and the set top box, even large pre-rasterized print jobs can be transmitted to the set top box in reasonable amounts of time, meaning more quickly than a situation in which it was the set top box that performed rasterization.
Amir Shahindoust - Laguna Niguel CA, US Michael Yeung - Mission Viejo CA, US
Assignee:
Kabushiki Kaisha Toshiba - Tokyo Toshiba Tec Kabushiki Kaisha - Tokyo
International Classification:
G06F 15/82
US Classification:
358 115
Abstract:
A system and method is provided for providing a file based job request queue for digital imaging devices. Job requests are stored in a section of file-based queue having a plurality of sections, wherein each section corresponds to a function of a multi-function digital image device. A key is assigned to each job request such that each job request in a section has a different key. Values are then computed for each job request based on the assigned job request key. The computed values are then stored such that they are searchable to determine the current state of the queue.
The present invention is directed to a system and method for the secure and correct deletion of data files from a data storage that bypasses the file system of an operating system. A secure erase service receives a secure erase request from a system interceptor component, which has intercepted a system call from an application. The system call interceptor component communicates with the secure erase service via an interprocess communication module. The secure erase service receives the secure erase request from the interprocess communication module and communicates the secure erase request to a secure erase library. Using the file information contained in the secure erase request, the secure erase library queries the file system of the data storage device to determine the location of data blocks containing the to be deleted data. Once, the location of the data blocks has been determined, the secure erase library then instructs the device driver, via a virtual file system, to overwrite the data blocks storing the electronic file a predetermined number of times.
George Koppich - Palos Verdes Estates CA, US Michael Lee Yeung - Mission Viejo CA, US Don Francis Purpura - Yorba Linda CA, US Paul Nicholas Gacek - Laguna Beach CA, US Tapani Otala - San Jose CA, US Douglas Richard Barr - Laguna Beach CA, US
Internet-based printing to a home printer in which the print job is pre-rasterized at the cable head end and sent in rasterized format to the set top box. Because the print job is pre-rasterized at the cable head end, and not at the set top box, resources are not wasted at the set top box when they are more readily available at the cable head end. In addition, because of the high speed communication network already in existence between the cable head end and the set top box, even large pre-rasterized print jobs can be transmitted to the set top box in reasonable amounts of time, meaning more quickly than a situation in which it was the set top box that performed rasterization.
System And Method For Secure Communication Of Electronic Documents
Amir Shahindoust - Laguna Niguel CA, US David Honig - Irvine CA, US Michael Yeung - Mission Viejo CA, US
Assignee:
Toshiba Corporation Toshiba Tec Kabushiki Kaisha
International Classification:
H04L 9/12 H04L 9/22 H04N 7/167 H04L 9/32
US Classification:
380 44, 380 43, 380239, 380262
Abstract:
The present invention is directed to a system and method for secure communication of electronic documents to a document processing device. A document processing request containing electronic document data is received containing document data in an unencrypted form. A seed value is then received and used to generate a random number. The random number is used to encrypt the electronic document. The seed value, in a header, is transmitted, along with the encrypted electronic document, to a document processing device. The document processing device extracts the seed value from the header and uses the seed value to generate a random number. The encrypted document is then decrypted using the random number generated from the seed value. The document processing device subsequently performs the selected document processing operation on the decrypted electronic document.
System And Method For Enhanced Data Security In Office Machine Environment
Girish R. Krishna - Torrance CA, US Michael Yeung - Mission Viejo CA, US Amir Shahindoust - Laguna Niguel CA, US
Assignee:
Toshiba Corporation Toshiba Tec Kabushiki Kaisha
International Classification:
H04L 9/00
US Classification:
713166, 713191, 380 37, 380 57
Abstract:
The present invention is directed to a system and method for adding data encryption services to a document processing device. Encryption enablement software, which includes two alternate encryption mechanisms, is received by an associated document processing device. The device then awaits an associated user's selection of an electronic document file to be encrypted and subsequently encrypts the file using one of the available encryption mechanisms. The electronic document file is divided into blocks having a preselected length. An encryption key block containing first and second key portions, is then generated. The electronic data file is then encrypted using the first encryption key portion to form first level encryption data. The first level encryption data is then decrypted using the second encryption key portion to form second level encryption data. The second level encryption data is then encrypted using the first key portion to form a final encrypted electronic document file.
Dr. Yeung graduated from the Texas Tech University Health Science Center School of Medicine - Lubbock in 2005. He works in Chapel Hill, NC and specializes in Interventional Cardiology and Cardiovascular Disease.
Yeah. Real Ni**a. All Day. Just Me. By Myself. On The Block. Holdin It Down. Gun on My waist. Straight Face. All Day. Not a Game. In Jail. By Myself! One Bed. No Pillow Case. One Pillow. - kevin hart >
Michael Yeung
Education:
Hong Kong University of Science and Technology - Biology
Michael Yeung, an assistant professor of chemistry leading the research, emphasized the importance of optimizing space within rockets. By reducing the space required for fuel storage, missions could allocate more room for essential equipment, scientific instruments, and even sample retrieval from ce
Date: Sep 06, 2025
Category: Science
Source: Google
Crypto chaos: From Vancouver to Halifax, tracing the mystery of Quadriga's missing millions
He spent time in Vancouver, too, and became a director of the Bitcoin Co-Op, an organization that promoted the use of cryptocurrency. Michael Yeung, another director, recalled Mr. Cotten as neither a naive idealist about bitcoin nor someone out to make a quick buck. My sense is he was a bit of both
Date: Feb 09, 2019
Category: Headlines
Source: Google
High mortality associated with STEMI heart attacks that occur in hospitalized ...
First author of the study is Prashant Kaul, MD, assistant professor of cardiology in the UNC School of Medicine. Co-authors are Jerome J. Federspiel, PhD; Xuming Dai, MD; Sally C. Stearns, PhD; Sidney C. Smith Jr., MD; Michael Yeung, MD; Hadi Beyhagi, MD; and Lei Zhou, MD.