George Koppich - Palos Verdes Estates CA Michael Lee Yeung - Mission Viejo CA Don Francis Purpura - Yorba Linda CA Paul Nicholas Gacek - Laguna Beach CA Tapani Otala - San Jose CA Douglas Richard Barr - Laguna Beach CA
Assignee:
Canon Kabushiki Kaisha - Tokyo
International Classification:
G06F 1300
US Classification:
358 115, 358 113
Abstract:
A software architecture for printing to a home printer via a cable television communication network includes complementary clients and servers executing on each of the internet components participating in the internet-based printing. A client executes at the remote internet-based site that originates the print job, and transmits the print job to a complimentary server at the cable head end. A server at the cable head end spools the print job and preferably converts the print job into a format more suitable for a next-downstream device, such as a cable set top box. The cable head end further includes a client which transmits the print job from the cable head ends server to a server at the set top box. The server at the set top box spools the print job to an attached printer. Preferably each of the clients and each of the servers is nearly identical to all other clients and servers, and each communicates to other applications including client applications through a consistent and uniform application programming interface.
George Koppich - Palos Verdes Estates CA, US Michael Lee Yeung - Mission Viejo CA, US Don Francis Purpura - Yorba Linda CA, US Paul Nicholas Gacek - Laguna Beach CA, US Tapani Otala - San Jose CA, US Douglas Richard Barr - Laguna Beach CA, US
Internet-based printing to a home printer in which the print job is pre-rasterized at the cable head end and sent in rasterized format to the set top box. Because the print job is pre-rasterized at the cable head end, and not at the set top box, resources are not wasted at the set top box when they are more readily available at the cable head end. In addition, because of the high speed communication network already in existence between the cable head end and the set top box, even large pre-rasterized print jobs can be transmitted to the set top box in reasonable amounts of time, meaning more quickly than a situation in which it was the set top box that performed rasterization.
The present invention is directed to a system and method for the secure and correct deletion of data files from a data storage that bypasses the file system of an operating system. A secure erase service receives a secure erase request from a system interceptor component, which has intercepted a system call from an application. The system call interceptor component communicates with the secure erase service via an interprocess communication module. The secure erase service receives the secure erase request from the interprocess communication module and communicates the secure erase request to a secure erase library. Using the file information contained in the secure erase request, the secure erase library queries the file system of the data storage device to determine the location of data blocks containing the to be deleted data. Once, the location of the data blocks has been determined, the secure erase library then instructs the device driver, via a virtual file system, to overwrite the data blocks storing the electronic file a predetermined number of times.
George Koppich - Palos Verdes Estates CA, US Michael Lee Yeung - Mission Viejo CA, US Don Francis Purpura - Yorba Linda CA, US Paul Nicholas Gacek - Laguna Beach CA, US Tapani Otala - San Jose CA, US Douglas Richard Barr - Laguna Beach CA, US
Internet-based printing to a home printer in which the print job is pre-rasterized at the cable head end and sent in rasterized format to the set top box. Because the print job is pre-rasterized at the cable head end, and not at the set top box, resources are not wasted at the set top box when they are more readily available at the cable head end. In addition, because of the high speed communication network already in existence between the cable head end and the set top box, even large pre-rasterized print jobs can be transmitted to the set top box in reasonable amounts of time, meaning more quickly than a situation in which it was the set top box that performed rasterization.
System And Method For Enhanced Data Security In Office Machine Environment
Girish R. Krishna - Torrance CA, US Michael Yeung - Mission Viejo CA, US Amir Shahindoust - Laguna Niguel CA, US
Assignee:
Toshiba Corporation Toshiba Tec Kabushiki Kaisha
International Classification:
H04L 9/00
US Classification:
713166, 713191, 380 37, 380 57
Abstract:
The present invention is directed to a system and method for adding data encryption services to a document processing device. Encryption enablement software, which includes two alternate encryption mechanisms, is received by an associated document processing device. The device then awaits an associated user's selection of an electronic document file to be encrypted and subsequently encrypts the file using one of the available encryption mechanisms. The electronic document file is divided into blocks having a preselected length. An encryption key block containing first and second key portions, is then generated. The electronic data file is then encrypted using the first encryption key portion to form first level encryption data. The first level encryption data is then decrypted using the second encryption key portion to form second level encryption data. The second level encryption data is then encrypted using the first key portion to form a final encrypted electronic document file.
The present invention is directed to a system and method for the secure and correct deletion of data files from a data storage that bypasses the file system of an operating system. A secure erase service receives a secure erase request from a system interceptor component, which has intercepted a system call from an application. The system call interceptor component communicates with the secure erase service via an interprocess communication module. The secure erase service receives the secure erase request from the interprocess communication module and communicates the secure erase request to a secure erase library. Using the file information contained in the secure erase request, the secure erase library queries the file system of the data storage device to determine the location of data blocks containing the to be deleted data. Once, the location of the data blocks has been determined, the secure erase library then instructs the device driver, via a virtual file system, to overwrite the data blocks storing the electronic file a predetermined number of times.
System And Method For Secure Exchange Of Trust Information
The present invention is directed to a system and method for propagation of security information for secure information exchange. Existing and new authentication information are gathered and combined into the same header. The header is attached to electronic document data encrypted by a client device and sent via a computer network to a document processing device. The document processing device, upon receipt of the header and document first decrypts the header and uses the existing authentication information to qualify the new authentication information by validating the existing authentication information through a trusted authentication mechanism. Once validated, the new authentication information is available for future document processing operations by the document processing device and other trusted document processing devices.
System And Method For Providing Fee-Based Data Services
Harpreet Singh - Orange CA, US Louis Ormond - Irvine CA, US Michael Yeung - Mission Viejo CA, US
International Classification:
G06F003/00
US Classification:
710/015000
Abstract:
A system and method to allow users in a non-office environment to access and use data services, such as scanning, printing, and distribution of documents and data and to charge the users for such services. Multifunctional peripheral devices are provided to service location providers for use by mobile users. A multifunctional peripheral device provider sells or leases the multifunctional peripheral device, related hardware and software, parts, and supplies to service location providers. The service location provider then provides access to the multiplication peripheral device and related services to mobile users. The user is then charged for the services used. The fees are paid to the multifunctional peripheral device provider. At least a portion of these fees are paid to any dealers involved in the sale or lease of the multifunctional peripheral device and to the service location providers. Any fees related to the sale or installation of the multifunctional peripheral device is also paid to the multifunctional peripheral device provider. At least a portion of these fees is paid to any dealers involved in the sale or lease of the multifunctional peripheral device.
Dr. Yeung graduated from the Texas Tech University Health Science Center School of Medicine - Lubbock in 2005. He works in Chapel Hill, NC and specializes in Interventional Cardiology and Cardiovascular Disease.
Krost Cpas & Consultants Jun 2016 - Jan 2018
Senior Tax Accountant
Hcvt Jun 2016 - Jan 2018
Tax Supervising Senior
Sobul, Primes & Schenkel Jan 2015 - May 2016
Staff Accountant
Altisource Jun 2012 - Aug 2013
Team Lead
Provident Funding Associates L.p. Feb 2008 - Dec 2011
Default Manager
Education:
University of Southern California 2018 - 2022
Masters, Business
Ucla Extension 2012 - 2014
The Collins College of Hospitality Management at Cal Poly Pomona 2003 - 2007
Bachelors, Bachelor of Science, Real Estate, Law, Finance
Yeah. Real Ni**a. All Day. Just Me. By Myself. On The Block. Holdin It Down. Gun on My waist. Straight Face. All Day. Not a Game. In Jail. By Myself! One Bed. No Pillow Case. One Pillow. - kevin hart >
Michael Yeung
Education:
Hong Kong University of Science and Technology - Biology
Michael Yeung, an assistant professor of chemistry leading the research, emphasized the importance of optimizing space within rockets. By reducing the space required for fuel storage, missions could allocate more room for essential equipment, scientific instruments, and even sample retrieval from ce
Date: Sep 06, 2025
Category: Science
Source: Google
Crypto chaos: From Vancouver to Halifax, tracing the mystery of Quadriga's missing millions
He spent time in Vancouver, too, and became a director of the Bitcoin Co-Op, an organization that promoted the use of cryptocurrency. Michael Yeung, another director, recalled Mr. Cotten as neither a naive idealist about bitcoin nor someone out to make a quick buck. My sense is he was a bit of both
Date: Feb 09, 2019
Category: Headlines
Source: Google
High mortality associated with STEMI heart attacks that occur in hospitalized ...
First author of the study is Prashant Kaul, MD, assistant professor of cardiology in the UNC School of Medicine. Co-authors are Jerome J. Federspiel, PhD; Xuming Dai, MD; Sally C. Stearns, PhD; Sidney C. Smith Jr., MD; Michael Yeung, MD; Hadi Beyhagi, MD; and Lei Zhou, MD.