Patents by Inventor George Chen

George Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11196761
    Abstract: Techniques are disclosed relating to account security operations based on security risk values that are modified based on one or more security risk criteria. In some embodiments, a system stores a plurality of key-value pairs in a datastore. Each key may specify a set of multiple access attributes corresponding to an origin computing system from which one or more access attempts were initiated and each value may include access information for one or more access attempts whose access attributes match a corresponding key. In some embodiments, the access information includes one or more account identifiers and result indications. In some embodiments, the system modifies security risk values based on multiple security risk criteria associated with different granularities of information in the datastore. A first criterion may be evaluated at a key granularity based on access attempts that match all of the multiple access attributes for a key.
    Type: Grant
    Filed: June 12, 2019
    Date of Patent: December 7, 2021
    Assignee: PayPal, Inc.
    Inventor: George Chen Kaidi
  • Publication number: 20210377288
    Abstract: There are provided systems and methods for identifying patterns in computing attacks through an automated traffic variance finder. A service provider, such as an electronic transaction processor for digital transactions, may determine network traffic logs caused or generated by malicious web traffic and network communications, such as during a computing attack by a bad actor. The service provider may generate a log signature for the network traffic log based on a variance or uniqueness of the network traffic logs IP address from other network traffic logs for each field in the network traffic log over a time period, and a spread in the commonality of the network traffic log with other network traffic logs. An aggregate score for each field may be determined based on the variance and the spread. Once determined, the log signature may be used to identify other network traffic logs through a search function.
    Type: Application
    Filed: May 26, 2020
    Publication date: December 2, 2021
    Inventor: George Chen Kaidi
  • Publication number: 20210367923
    Abstract: Methods and systems are presented for detecting and dynamically rate limiting unauthorized attempts to obtain user account information from an online service provider. An online system is configured with a request rate limit and a list of user identifiers associated with accounts at risk of being compromised. The system receives requests, each associated with a user identifier, from one or more devices. The system determines what amount of user identifiers associated with the requests match user identifiers on the list over a period of time. If the amount meets or exceeds a threshold, the system reduces the request rate limit for devices that made a request associated with user identifiers matching those on the list.
    Type: Application
    Filed: May 19, 2020
    Publication date: November 25, 2021
    Inventor: George Chen Kaidi
  • Patent number: 11179367
    Abstract: A pharmaceutical composition comprising Compound I: Methods of treating cystic fibrosis comprising administering one or more of such pharmaceutical compositions to a patient.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: November 23, 2021
    Assignee: Vertex Pharmaceuticals Incorporated
    Inventors: Cathy Chu, Varsha Dhamankar, Eleni Dokou, Eric L. Haseltine, Samuel Moskowitz, Sarah Robertson, David Waltz, Weichao George Chen
  • Publication number: 20210360028
    Abstract: There are provided systems and methods for protecting from directory enumeration using honeypot pages within a network directory. A service provider, such as an electronic transaction processor for digital transactions, may have an internal network that is utilized by employees, developers, and other end users within the organization of the service provider. When internal devices become compromised or internal users act maliciously, they may attempt to enumerate a directory to find hidden pages that have secret or sensitive data. The service provider may therefore detect a scan of an internal directory having files paths to files and pages and may deploy honeypot pages that change an error status. Further, the service provider may add a process or operation to log additional data on these honeypot pages and/or change a byte size of the corresponding pages to confuse the enumeration attempt and obtain true source information.
    Type: Application
    Filed: May 15, 2020
    Publication date: November 18, 2021
    Inventor: George Chen Kaidi
  • Patent number: 11155533
    Abstract: Crystalline Forms of Compound I: and pharmaceutically acceptable salts thereof are disclosed. Pharmaceutical compositions comprising the same, methods of treating cystic fibrosis using the same, and methods for making the same are also disclosed.
    Type: Grant
    Filed: March 25, 2020
    Date of Patent: October 26, 2021
    Assignee: Vertex Pharmaceuticals Incorporated
    Inventors: Varsha Dhamankar, Kirk Raymond Dinehart, Eleni Dokou, Lori Ann Ferris, Nishanth Gopinathan, Katie McCarty, Catherine Metzler, Beili Zhang, Samuel Moskowitz, Sarah Robertson, David Waltz, Eric L. Haseltine, Weichao George Chen
  • Publication number: 20210326432
    Abstract: There are provided systems and methods for user specific error detection for accepting authentication credential errors. A service provider, such as an authentication server and/or transaction processor, may require credentials for a user to utilize a specific service, such as an account and account services. The user may establish an authentication credential, such as a password or other secret, that allows the user to use the account. The user may then attempt to utilize the credentials with the service provider but may perform a typo in entering the authentication credential. The service provider may reject an authentication of the user but may allow the user to reenter the authentication credential. If the user correctly enters the authentication credential at this stage, the service provider may perform analysis of the incorrect and correct authentication credential to determine whether to allow the incorrect authentication credential for future authentications.
    Type: Application
    Filed: April 17, 2020
    Publication date: October 21, 2021
    Inventor: George Chen Kaidi
  • Patent number: 11146084
    Abstract: A power sensing and indication circuit includes a first device connector for charging a first device and having a first pin and a second pin, the first pin of the first device connector being connected to an output voltage port of a controller. The power sensing and indication circuit includes a first amplifier. The first amplifier has an inverting input port, a non-inverting input port and an output port. The power sensing and indication circuit includes a first set of multiple photodiodes for emitting light of a first color and a second set of multiple photodiodes for emitting light of a second color. The power sensing and indication circuit includes at least one of a transistor or a digital circuit to cause the first set of multiple diodes to emit light of the first color or the second set of multiple photodiodes to emit light of the second color.
    Type: Grant
    Filed: August 4, 2017
    Date of Patent: October 12, 2021
    Assignee: Superior Communications, Inc.
    Inventors: George Chen, Samuel Sentosa, David Su
  • Patent number: 11109504
    Abstract: A power distribution unit (“PDU”) comprises a housing, a power module mechanically connected to the housing, at least one outlet module separately and mechanically connected to the housing, and a communications module mechanically connected to the housing. The PDU includes busbars that are electrically connected to the modules.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: August 31, 2021
    Assignee: EATON INTELLIGENT POWER LIMITED
    Inventors: Josiah Daniel Smith, George Chen, John Douglas Carroll, Long Larry Le
  • Publication number: 20210254285
    Abstract: The present disclosure provides materials such as cellulose based materials and composite materials. Also provided herein are methods for making or using the materials.
    Type: Application
    Filed: April 26, 2021
    Publication date: August 19, 2021
    Applicant: Ecoinno (H.K) Limited
    Inventors: George Chen, Koon-Yang Lee, Alexander Bismarck, Robert Li
  • Patent number: 11082437
    Abstract: Methods and systems are presented for detecting attacks to a computer network based on analyzing access of external script through a web server. When an HTTP request is directed to a web server, the HTTP request is analyzed to determine whether the HTTP request refers to an external network address. External content that includes executable script code may be obtained from an external server based on the external network address. The external script code may be modified to transform the external script code to be inexecutable by a computer. The modified script code may be subsequently stored. The modified script may also be analyzed to determine whether the script is associated with an attack to the web server or an associated computer network.
    Type: Grant
    Filed: December 17, 2019
    Date of Patent: August 3, 2021
    Assignee: PayPal, Inc.
    Inventor: George Chen Kaidi
  • Patent number: 11066417
    Abstract: Compounds of Formula (I): pharmaceutically acceptable salts thereof, deuterated derivatives of any of the foregoing, and metabolites of any of the foregoing are disclosed. Pharmaceutical compositions comprising the same, methods of treating cystic fibrosis using the same, and methods for making the same are also disclosed.
    Type: Grant
    Filed: February 14, 2019
    Date of Patent: July 20, 2021
    Assignee: Vertex Pharmaceuticals Incorporated
    Inventors: Jeremy J. Clemens, Alexander Russell Abela, Corey Don Anderson, Brett B. Busch, Weichao George Chen, Thomas Cleveland, Timothy Richard Coon, Bryan Frieman, Senait G. Ghirmai, Peter Grootenhuis, Anton V. Gulevich, Sara Sabina Hadida Ruah, Clara Kuang-Ju Hsia, Ping Kang, Haripada Khatuya, Jason McCartney, Mark Thomas Miller, Prasuna Paraselli, Fabrice Pierre, Sara E. Swift, Andreas Termin, Johnny Uy, Carl V. Vogel, Jinglan Zhou
  • Patent number: 11062224
    Abstract: Methods and apparatus for predicting unknown values given a data set of known values. A prediction engine ingests a variety of data sets. Once the dataset has been ingested, requests for predictions may be presented to the prediction engine. The engine responds with a prediction as well as a confidence score based on the ingested information using a variety of techniques. Some of these techniques identify witness values in the ingested data that are similar to the requested prediction, other techniques compute witness values from ingested data, etc. These witness values are aggregated to yield an answer and a confidence level in a way that permits the user to review the underlying witness values.
    Type: Grant
    Filed: October 14, 2016
    Date of Patent: July 13, 2021
    Assignee: NIKE, Inc.
    Inventors: George Chen, Vishal Doshi, Ying-zong Huang, Vighnesh Sachidananda, Devavrat Shah, Vasudha Shivamoggi
  • Publication number: 20210203675
    Abstract: A method includes determining, based on login information corresponding to a plurality of login attempts, that a set of password spray criteria have been satisfied. The method also includes generating respective scoring patterns corresponding to one or more password lengths and based on the respective scoring patterns, generating a common digital signature for a set of common passwords. The method further includes generating a spray digital signature for a set of potential spray passwords based on the respective scoring patterns. Additionally, the method includes comparing the spray digital signature with the common digital signatures to determine a number of matching components between the spray digital signatures and the common digital signature. Based on the number of matching components, the method includes determining whether a password spray has been attempted.
    Type: Application
    Filed: December 31, 2019
    Publication date: July 1, 2021
    Inventor: George Chen Kaidi
  • Publication number: 20210185060
    Abstract: Methods and systems are presented for detecting attacks to a computer network based on analyzing access of external script through a web server. When an HTTP request is directed to a web server, the HTTP request is analyzed to determine whether the HTTP request refers to an external network address. External content that includes executable script code may be obtained from an external server based on the external network address. The external script code may be modified to transform the external script code to be inexecutable by a computer. The modified script code may be subsequently stored. The modified script may also be analyzed to determine whether the script is associated with an attack to the web server or an associated computer network.
    Type: Application
    Filed: December 17, 2019
    Publication date: June 17, 2021
    Inventor: George Chen Kaidi
  • Publication number: 20210174318
    Abstract: Techniques are disclosed relating to determining characteristics associated with attempts to request access an online system. A security test that changes one or more parameters associated with accessing the online system may be implemented for a determined time interval. The parameters changed may include user interface parameters, security threshold parameters, and addresses of servlets in the online system. Access requests received during the security test may be compared to access requests received before and after the security test to determine characteristics of scripted access requests (e.g., automated attacks by one or more malicious users) and legitimate access requests to the online system. The present techniques enhance computer system security and can bolster network bandwidth by allowing malicious access requests to be more easily identified and filtered out.
    Type: Application
    Filed: December 9, 2019
    Publication date: June 10, 2021
    Inventor: George Chen Kaidi
  • Publication number: 20210126926
    Abstract: Techniques are disclosed relating to detecting data leaks using targeted scanning. For example, in various embodiments, a scanner module may monitor communications between a user device and a server system, where the user device requests access to a resource provided via the server system. The scanner module may perform various data loss prevention operations to detect the leaking of sensitive data associated with an organization. For example, the scanner module may perform an initial scan of the resource to capture an initial version of the resource at an establishment of a connection between the user device and the server system. The scanner module may perform a subsequent scan that captures a subsequent version of the resource. Based on the initial and subsequent versions of the resource, the scanner module may determine whether any data loss prevention rules have been violated and, if so, initiate one or more corrective actions.
    Type: Application
    Filed: October 25, 2019
    Publication date: April 29, 2021
    Inventor: George Chen Kaidi
  • Patent number: 10988897
    Abstract: The present disclosure provides materials such as cellulose based materials and composite materials. Also provided herein are methods for making or using the materials.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: April 27, 2021
    Assignee: ECOINNO (H.K.) LIMITED
    Inventors: George Chen, Koon-Yang Lee, Alexander Bismarck, Robert Li
  • Publication number: 20210117921
    Abstract: Systems and techniques for providing security data points from an electronic message are presented. A system can determine a first internet protocol (IP) address of a computing device in response to a user of the computing device opening an email sent to an email address corresponding to a particular electronic account of the user, the email comprising an IP address tracking mechanism. The system can also compare the first IP address with one or more second IP addresses corresponding to one or more electronic accesses of the particular electronic account. Furthermore, the system can determine if an account access anomaly exists in regard to the particular electronic account based on a result of the comparing. The system can also implement a security measure impacting an ability of the particular electronic account to conduct one or more transactions in response to the account access anomaly existing for the particular electronic account.
    Type: Application
    Filed: October 19, 2019
    Publication date: April 22, 2021
    Inventor: George Chen Kaidi
  • Publication number: 20210113547
    Abstract: Compound I of the formula (formula) A pharmaceutically acceptable salt of Compound I. Pharmaceutical compositions containing at least Compound I and methods of treating cystic fibrosis comprising administering at least Compound I. Pharmaceutical compositions containing a pharmaceutically acceptable salt of at least Compound I and methods of treating cystic fibrosis comprising administering a pharmaceutically acceptable salt of at least Compound I.
    Type: Application
    Filed: June 8, 2018
    Publication date: April 22, 2021
    Inventors: Weichao George Chen, Eric L. Haseltine, Samuel Moskowitz, Sarah Robertson, David Waltz