Patents by Inventor Jason Chan

Jason Chan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240136449
    Abstract: A solar cell includes a semiconductor material having a dielectric layer over a light-receiving surface of the semiconductor material, a plurality of printed fire-through contacts passing substantially through the dielectric layer, each contact extending longitudinally in a first dimension, and a conductive finger extending longitudinally in a second dimension substantially perpendicular to the first dimension and electrically connecting the plurality of contacts to first and second busbars at opposite ends of the conductive finger. The conductive finger has at least one first portion overlaying and electrically connecting to the plurality of contacts, wherein each of the plurality of contacts extends beyond the first portion of the conductive finger at one or both sides of the first portion of the conductive finger in the first dimension, and wherein the first portion of the conductive finger overlays the dielectric.
    Type: Application
    Filed: February 22, 2022
    Publication date: April 25, 2024
    Inventors: Brett Jason HALLAM, Catherine Emily CHAN, Daniel CHEN, Yuchao ZHANG, Brendan WRIGHT
  • Publication number: 20240119795
    Abstract: A gaming machine, system, method, and program product provide a slot machine game with a movement game board bonus game. Responsive to a trigger pattern in a base game result, a prize board is displayed including a number of symbol locations containing symbols indicating prizes, and a current position indicator indicating a current location on the board. A number of selectable items are provided from which the player may select. Responsive to selections, one of a movement indicator with an associated movement direction, or a prize collector indicator are revealed. For a movement indicator, the current position indicator moves to an adjacent one of the symbols on the prize board in a direction shown by the movement indicator. For a prize collector indicator, the method includes awarding a prize associated with the prize level of the current position indicator.
    Type: Application
    Filed: October 7, 2022
    Publication date: April 11, 2024
    Applicant: Everi Games Inc.
    Inventors: Juan Mariscal, Cydny Bloem Audia, Darren Hale, Cara Cioffari, Jason Chan, Andrew Durre
  • Publication number: 20240075815
    Abstract: A refuse vehicle includes a chassis, an energy storage device supported by the chassis and configured to provide electrical power to a prime mover, wherein activation of the prime mover selectively drives the refuse vehicle, a body for storing refuse therein supported by the chassis, a first hydraulic pump configured to convert electrical power into hydraulic power, a second first hydraulic pump configured to convert electrical power into hydraulic power, and a motor coupled to at least one of the body or the chassis and configured to drive the first hydraulic pump and drive the second hydraulic pump.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 7, 2024
    Inventors: Jeffrey Koga, Emily Davis, Jerrod Kappers, Vince Schad, Robert S. Messina, Christopher K. Yakes, Vincent Hoover, Clinton T. Weckwerth, Zachary L. Klein, John Beck, Brendan Chan, Skylar A. Wachter, Nader Nasr, Chad K. Smith, Logan Gary, Derek A. Wente, Shawn Naglik, Mike J. Bolton, Jacob Wallin, Quincy Wittman, Christopher J. Rukas, Dylan Hess, Jason Rice, Zhenyi Wei, Bashar Amin, Catherine Linsmeier, Joshua D. Rocholl, Dale Matsumoto
  • Publication number: 20240065744
    Abstract: A medical screw, including: a first region comprising a constant diameter first root having a first diameter and a constant pitch multi-start thread; a second region forming a transition region; and a third region including a constant diameter root having the first diameter and a constant pitch thread, wherein the transition region is in between the first region and the second region and joins the first region with the second region, and wherein a lead of the constant pitch multi-start thread is different from a lead of the constant pitch thread.
    Type: Application
    Filed: August 31, 2022
    Publication date: February 29, 2024
    Inventors: Jason Chan, Ganesan Murugesan, Abhishek Ekbote, Mani Muruganandarn, Thiruppaithi Dhilip, Anbazhagan Sivakurnar
  • Publication number: 20220358150
    Abstract: Systems and methods may use natural language processing (NLP) and machine-learning techniques to detect an impact that an event will have on a domain-specific topic. For example, the system may use multi-stage cleaning using a rules-based and an artificial intelligence (AI)-based filter to filter large quantities of event items that may not be relevant to a domain of interest. The AI-based filter may be trained using labeled event items that were previously known to be impactful. The system may cluster the cleaned event items to group similar event items and eliminate redundancy. The system may then predict and quantify the impact that events described by clustered event items will have on the domain-specific topic. Such prediction may be based on a classifier trained using various model features that correlate with impactful events, including prior similar events.
    Type: Application
    Filed: May 6, 2022
    Publication date: November 10, 2022
    Applicant: REFINITIV US ORGANIZATION LLC
    Inventors: Nitish Ramkumar, Joseph Whyte, Ben Chu, Jason Chan, Swarnima Sircar, Kelvin Rocha, Regan Tuck, Alena Melnikova
  • Patent number: 11268152
    Abstract: In accordance with the present invention, the single gene SERPINA1 has been identified as a significant predictor of survival in ER+ and ER+/HER2+ breast cancer patients. For example, patients with ER+/FIER2+ breast cancer generally have a worse outcome compared to ER+/FIER2? and ER?/FIER2+ patients. Currently there is no known predictive marker for the treatment C outcome of ER+ and ER+/FIER2+ breast cancers, thus the ability of SERPINA1 to predict the survival of this intrinsic subtype of breast cancer patients is valuable.
    Type: Grant
    Filed: January 19, 2016
    Date of Patent: March 8, 2022
    Assignee: CITY OF HOPE
    Inventors: Shiuan Chen, Hei Jason Chan
  • Patent number: 11182480
    Abstract: Particular embodiments described herein provide for a system that can be configured to identify cryptomining malware. The electronic device can be configured to identify a website, determine one or more uniform resource locators associated with the website, determine scripts associated with the website, obtain a string format of each of the determined scripts associated with the website, analyze each of the of the string formats to determine if a specific script is related to malware, and block the website if the specific script is related to malware. In an example, the system can also be configured to determine if usage of the computer processing unit and/or system resources increase more than a threshold amount during access to the website and send the one or more uniform resource locators associated with the website to a network security engine for further analysis.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: November 23, 2021
    Assignee: McAfee, LLC
    Inventors: William Park, Jason Chan, Wilson Shing-Hay Li
  • Patent number: 10769282
    Abstract: A method and system for discovering and testing security assets is provided. Based on source definition data describing sources to monitor on the one or more computer networks, an example system scans the sources to identify security assets. The system analyses the security assets to identify characteristics of the server-based applications. The system stores database records describing the security assets and the identified characteristics. The system queries the database records to select, based at least on the identified characteristics, one or more target assets, from the security assets, on which to conduct one or more security tests. Responsive to selecting the one or more target assets, the system conducts the one or more security tests on the one or more target assets. The system identifies one or more security vulnerabilities at the one or more target assets based on the conducted one or more security tests.
    Type: Grant
    Filed: June 4, 2018
    Date of Patent: September 8, 2020
    Assignee: NETFLIX, INC.
    Inventors: Jason Chan, Patrick Kelley, Benjamin Hagen, Samuel Reed
  • Patent number: 10701035
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: June 30, 2020
    Assignee: NETFLIX, INC.
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Patent number: 10691814
    Abstract: A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed computing architecture. The security application monitors various classes of resources utilized by the collection of nodes within the distributed computing architecture and determine whether utilization of a class of resources is approaching a pre-determined maximum limit. The security application performs a vulnerability scan of a networked application to determine whether the networked application is prone to a risk of intentional or inadvertent breach by an external application. The security application scans a distributed computing architecture for the existence of access control lists (ACLs), and stores ACL configurations and configuration changes in a database.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: June 23, 2020
    Assignee: NETFLIX, INC.
    Inventors: Ariel Tseitlin, Roy Rapoport, Jason Chan
  • Publication number: 20200104489
    Abstract: Particular embodiments described herein provide for a system that can be configured to identify cryptomining malware. The electronic device can be configured to identify a website, determine one or more uniform resource locators associated with the website, determine scripts associated with the website, obtain a string format of each of the determined scripts associated with the website, analyze each of the of the string formats to determine if a specific script is related to malware, and block the website if the specific script is related to malware. In an example, the system can also be configured to determine if usage of the computer processing unit and/or system resources increase more than a threshold amount during access to the website and send the one or more uniform resource locators associated with the website to a network security engine for further analysis.
    Type: Application
    Filed: September 28, 2018
    Publication date: April 2, 2020
    Applicant: McAfee, LLC
    Inventors: William Park, Jason Chan, Wilson Shing-Hay Li
  • Patent number: 10332116
    Abstract: Provided herein are systems and methods of monitoring account activity in a streaming media environment. An exemplary system includes a monitoring system, an account creation and management system, and an account payment system. The monitoring system is coupled to the account creation and management system and the account payment system via a network. The processing device of the monitoring system retrieves account information for a first user account. Account information includes user consumption information and user payment information associated with the first user account. The processing device determines a fraudulent account score for the first user account based on at least one of the user consumption information, the user payment information, and account identification information.
    Type: Grant
    Filed: October 6, 2015
    Date of Patent: June 25, 2019
    Assignee: Netflix, Inc.
    Inventors: Rudra Peram, Jason Chan
  • Patent number: 10315007
    Abstract: A vascular access system includes a catheter having an inner lumen in communication with an open distal end; a guidewire at least partially positioned in the catheter lumen and extending out the open distal end thereof, respective proximal and distal stops secured to the guidewire; and a centering device slidably mounted on the guidewire such that the centering device may freely within the catheter lumen relative to the guidewire between the proximal and distal stops, wherein the centering device substantially aligns a longitudinal axis of the catheter with a longitudinal axis of the guidewire proximate the centering device.
    Type: Grant
    Filed: July 14, 2015
    Date of Patent: June 11, 2019
    Assignees: Stryker Corporation, Stryker European Holdings I, LLC
    Inventors: Jason Chan, Huey Chan
  • Patent number: 10262145
    Abstract: Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing environment. An exemplary application security system an application security server having a processing device in communication with one or more storage systems and includes a security testing system with a plurality of security test modules. The test modules include a first module associated with a first application associated with one or more application instances configured to receive and transmit over a network.
    Type: Grant
    Filed: September 15, 2017
    Date of Patent: April 16, 2019
    Assignee: Netflix, Inc.
    Inventors: Andy Hoernecke, Jason Chan
  • Patent number: 10178074
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: January 8, 2019
    Assignee: NETFLIX, INC.
    Inventors: Poornaprajna Udupi, Jason Chan, Jay Zarfoss
  • Publication number: 20180349615
    Abstract: A method and system for discovering and testing security assets is provided. Based on source definition data describing sources to monitor on the one or more computer networks, an example system scans the sources to identify security assets. The system analyses the security assets to identify characteristics of the server-based applications. The system stores database records describing the security assets and the identified characteristics. The system queries the database records to select, based at least on the identified characteristics, one or more target assets, from the security assets, on which to conduct one or more security tests. Responsive to selecting the one or more target assets, the system conducts the one or more security tests on the one or more target assets. The system identifies one or more security vulnerabilities at the one or more target assets based on the conducted one or more security tests.
    Type: Application
    Filed: June 4, 2018
    Publication date: December 6, 2018
    Inventors: Jason Chan, Patrick Kelley, Benjamin Hagen, Samuel Reed
  • Publication number: 20180316647
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Application
    Filed: April 23, 2018
    Publication date: November 1, 2018
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Publication number: 20180307849
    Abstract: A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed computing architecture. The security application monitors various classes of resources utilized by the collection of nodes within the distributed computing architecture and determine whether utilization of a class of resources is approaching a pre-determined maximum limit. The security application performs a vulnerability scan of a networked application to determine whether the networked application is prone to a risk of intentional or inadvertent breach by an external application. The security application scans a distributed computing architecture for the existence of access control lists (ACLs), and stores ACL configurations and configuration changes in a database.
    Type: Application
    Filed: April 23, 2018
    Publication date: October 25, 2018
    Inventors: Ariel TSEITLIN, Roy RAPOPORT, Jason CHAN
  • Publication number: 20180264109
    Abstract: In accordance with the present invention, the single gene SERPINA1 has been identified as a significant predictor of survival in ER+ and ER+/HER2+ breast cancer patients. For example, patients with ER+/FIER2+ breast cancer generally have a worse outcome compared to ER+/FIER2? and ER?/FIER2+ patients. Currently there is no known predictive marker for the treatment C outcome of ER+ and ER+/FIER2+ breast cancers, thus the ability of SERPINA1 to predict the survival of this intrinsic subtype of breast cancer patients is valuable.
    Type: Application
    Filed: January 19, 2016
    Publication date: September 20, 2018
    Inventors: Shiuan Chen, Hei Jason Chan
  • Patent number: 9990499
    Abstract: A method and system for discovering and testing security assets is provided. Based on source definition data describing sources to monitor on the one or more computer networks, an example system scans the sources to identify security assets. The system analyses the security assets to identify characteristics of the server-based applications. The system stores database records describing the security assets and the identified characteristics. The system queries the database records to select, based at least on the identified characteristics, one or more target assets, from the security assets, on which to conduct one or more security tests. Responsive to selecting the one or more target assets, the system conducts the one or more security tests on the one or more target assets. The system identifies one or more security vulnerabilities at the one or more target assets based on the conducted one or more security tests.
    Type: Grant
    Filed: August 5, 2013
    Date of Patent: June 5, 2018
    Assignee: NETFLIX, INC.
    Inventors: Jason Chan, Patrick Kelley, Benjamin Hagen, Samuel Reed