Patents by Inventor Chengi Kuo

Chengi Kuo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11736488
    Abstract: A computer-implemented method for selectively monitoring devices may include (i) identifying a set of characteristics of a device-usage session of a device, (ii) calculating, based on the set of characteristics, a privacy score for the device-usage session, (iii) selecting, for the device, a device monitoring profile that is correlated with the privacy score and that defines an intensity level of monitoring actions to be performed on the device, and (iv) monitoring activity performed on the device during the device-usage session in accordance with the device monitoring profile that is correlated with the privacy score for the device-usage session. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 30, 2020
    Date of Patent: August 22, 2023
    Assignee: GEN DIGITAL INC.
    Inventors: Lei Gu, Chengi Kuo
  • Patent number: 10692078
    Abstract: Methods and systems for generating limited-use credit card numbers at a consumer device and verifying said numbers for completing transactions are provided. One example method generally includes determining a current time; generating a first series of digits based on the current time and an account credential associated with an account number; combining, by the consumer device, the first series of digits with the account number to form a first card number; and making the first card number available for use.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: June 23, 2020
    Assignee: NortonLifeLock Inc.
    Inventor: Chengi Kuo
  • Patent number: 10546117
    Abstract: The disclosed computer-implemented method for managing security programs may include (i) identifying a security program configured to analyze files on a client device to detect malicious files, (ii) determining a result the security program would report for an analysis of a file on the client device, (iii) intercepting an attempt by the security program to analyze the file, and (iv) determining, based on the result the security program would report for the analysis of the file, whether to permit the security program to analyze the file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 15, 2016
    Date of Patent: January 28, 2020
    Assignee: Symantec Corporation
    Inventors: Chengi Kuo, Haik Mesropian, David Kane
  • Patent number: 10291730
    Abstract: The present disclosure relates to managing a rate of generating data requests to be processed at a service provider. An example method generally includes detecting an instance of a push notification event directed to a group of endpoint systems. The push notification event generally indicates that push notifications are to be transmitted to the group of endpoint systems to generate the data requests. A computing system determines a resource utilization associated with at least one of the data requests generated based on the push notification event and determines a push notification transmission rate based on the determined resource utilization and computing resources available at the service provider. The rate generally indicates a number of push notifications to generate and transmit over a period of time. The computing system transmits the push notifications to the group of endpoint systems based on the calculated push notification transmission rate.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: May 14, 2019
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Chengi Kuo
  • Patent number: 10257229
    Abstract: The disclosed computer-implemented method for verifying users based on user motion may include (1) instructing a user of a mobile device to physically move in a prescribed manner, (2) receiving information, collected by one or more sensors associated with the mobile device, describing physical movement performed by the user after the user receives the instruction, (3) determining, upon receiving the information, that the user's physical movement matches the prescribed movement, and (4) verifying the user in response to determining that the user's physical movement matches the prescribed movement. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 17, 2016
    Date of Patent: April 9, 2019
    Assignee: Symantec Corporation
    Inventors: Chengi Kuo, Petrus J. Viljoen
  • Patent number: 10061683
    Abstract: The disclosed computer-implemented method for collecting error data to troubleshoot product errors may include (1) monitoring Internet searches submitted by a user of a computing device to a search engine executing within a browser installed on the computing device, (2) identifying, while monitoring the Internet searches, a search including a description of an error in a product installed on the computing device, (3) in response to identifying the search, automatically enabling debug logging for the product on the computing device, and (4) maintaining an event log including information collected from the debug logging that may be used to diagnose the error. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 10, 2016
    Date of Patent: August 28, 2018
    Assignee: Symantec Corporation
    Inventors: Anand Sankruthi, Chengi Kuo
  • Patent number: 10032023
    Abstract: A computer-implemented method for selectively applying malware signatures may include (1) receiving a time-sensitive malware signature at a receiving time to apply to a computing environment, (2) identifying a first target object observed within the computing environment at a first observation time, (3) deactivating the time-sensitive malware signature with respect to the first target object based on a difference between the receiving time and the first observation time, (4) observing a second target object within the computing environment subject to malware scans, the second target object being observed within the computing environment at a second observation time that is later than the first observation time, and (5) activating the time-sensitive malware signature with respect to the second target object based on a difference between the receiving time and the second observation time. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 25, 2016
    Date of Patent: July 24, 2018
    Assignee: Symantec Corporation
    Inventor: Chengi Kuo
  • Publication number: 20170277618
    Abstract: The disclosed computer-implemented method for collecting error data to troubleshoot product errors may include (1) monitoring Internet searches submitted by a user of a computing device to a search engine executing within a browser installed on the computing device, (2) identifying, while monitoring the Internet searches, a search including a description of an error in a product installed on the computing device, (3) in response to identifying the search, automatically enabling debug logging for the product on the computing device, and (4) maintaining an event log including information collected from the debug logging that may be used to diagnose the error. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: May 10, 2016
    Publication date: September 28, 2017
    Inventors: Anand Sankruthi, Chengi Kuo
  • Patent number: 4312287
    Abstract: A ship or other vessel having a moonpool therein and an enclosed space above the moonpool is provided with a pontoon which floats on the surface of the sea within the moonpool. The effects of the enclosed space is that said sea surface is calm even when the ambient sea is subject to an adverse swell, and the effect of the pontoon is that it will remain substantially stationary and be independant of the vessels heaving motion, i.e. the pontoon is de-coupled from the vessel. Lifting gear mounted on the pontoon is used to lower and raise submersibles, sub-sea equipment, tethered bells or divers (tethered or free swimming). The pontoon may be used as a stable work area and for loading and unloading cargo; in the latter case, a housing forming the enclosed space above the moonpool has a double opening through which the cargo can pass, but only on opening at a time is opened so as to preserve the enclosed space above the moonpool.
    Type: Grant
    Filed: September 27, 1978
    Date of Patent: January 26, 1982
    Assignee: The University of Strathclyde
    Inventor: Chengi Kuo