Patents by Inventor Jason Chan

Jason Chan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9954822
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: April 24, 2018
    Assignee: NETFLIX, INC.
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Patent number: 9953173
    Abstract: A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed computing architecture. The security application monitors various classes of resources utilized by the collection of nodes within the distributed computing architecture and determine whether utilization of a class of resources is approaching a pre-determined maximum limit. The security application performs a vulnerability scan of a networked application to determine whether the networked application is prone to a risk of intentional or inadvertent breach by an external application. The security application scans a distributed computing architecture for the existence of access control lists (ACLs), and stores ACL configurations and configuration changes in a database.
    Type: Grant
    Filed: May 4, 2015
    Date of Patent: April 24, 2018
    Assignee: NETFLIX, INC.
    Inventors: Ariel Tseitlin, Roy Rapoport, Jason Chan
  • Publication number: 20180004960
    Abstract: Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing environment. An exemplary application security system an application security server having a processing device in communication with one or more storage systems and includes a security testing system with a plurality of security test modules. The test modules include a first module associated with a first application associated with one or more application instances configured to receive and transmit over a network.
    Type: Application
    Filed: September 15, 2017
    Publication date: January 4, 2018
    Inventors: Andy Hoernecke, Jason Chan
  • Patent number: 9836969
    Abstract: A system and method are provided for connecting intersections, to enable two-way wireless communication between a cloud-based traffic operations service and new and existing traffic cabinet hardware using “connected intersection” technology. By providing hardware in existing (or new) traffic control cabinets that can communicate wirelessly with a cloud-based traffic operations system, customers can enhance and upgrade legacy traffic networks using existing IT infrastructure (i.e. servers, hard drives, etc.) or existing communication networks. The connected intersection technology further provides software functionalities including real-time alerts, connectivity between existing cabinets and central systems, and signal timing-plan management for customers that lack an existing central system.
    Type: Grant
    Filed: May 9, 2016
    Date of Patent: December 5, 2017
    Assignee: Miovision Technologies Incorporated
    Inventors: David Thompson, Tyler Abbott, Kashif Umer, David Hillis, Roy Lemke, Jason Chan
  • Patent number: 9825956
    Abstract: Provided herein are systems and methods of managing permissions for applications deployed in a distributed computing infrastructure. An exemplary system includes an access management server having a processing device, a distributed computing infrastructure in communication with the management server having a plurality of resource instances and a request log, an administration system having a security application executing thereon. The security application has access policies associated with each of a plurality of applications. The processing device of the management server: receives application request information from the request log describing requests made by a first application being monitored by the access management server.
    Type: Grant
    Filed: October 6, 2015
    Date of Patent: November 21, 2017
    Assignee: NETFLIX, INC.
    Inventors: Patrick Kelley, Ben Hagen, Jason Chan, Kevin Glisson
  • Patent number: 9767291
    Abstract: Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing environment. An exemplary application security system includes a server having a processing device in communication with storage systems, computing devices executing application instances configured to receive and transmit information over a network, and a security testing system including a first test module that is associated with a first application, which is associated with one or more of the application instances.
    Type: Grant
    Filed: October 6, 2015
    Date of Patent: September 19, 2017
    Assignee: NETFLIX, INC.
    Inventors: Andy Hoernecke, Jason Chan
  • Publication number: 20170207911
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Application
    Filed: March 31, 2017
    Publication date: July 20, 2017
    Inventors: Poornaprajna UDUPI, Jason CHAN, Jay ZARFOSS
  • Publication number: 20170201489
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Application
    Filed: March 28, 2017
    Publication date: July 13, 2017
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Patent number: 9621588
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Grant
    Filed: September 24, 2014
    Date of Patent: April 11, 2017
    Assignee: NETFLIX, INC.
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Publication number: 20170099292
    Abstract: Provided herein are systems and methods of managing permissions for applications deployed in a distributed computing infrastructure. An exemplary system includes an access management server having a processing device, a distributed computing infrastructure in communication with the management server having a plurality of resource instances and a request log, an administration system having a security application executing thereon. The security application has access policies associated with each of a plurality of applications. The processing device of the management server: receives application request information from the request log describing requests made by a first application being monitored by the access management server.
    Type: Application
    Filed: October 6, 2015
    Publication date: April 6, 2017
    Inventors: Patrick Kelley, Ben Hagen, Jason Chan, Kevin Glisson
  • Publication number: 20170098086
    Abstract: Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing environment. An exemplary application security system includes a server having a processing device in communication with storage systems, computing devices executing application instances configured to receive and transmit information over a network, and a security testing system including a first test module that is associated with a first application, which is associated with one or more of the application instances.
    Type: Application
    Filed: October 6, 2015
    Publication date: April 6, 2017
    Inventors: Andy Hoernecke, Jason Chan
  • Publication number: 20170098219
    Abstract: Provided herein are systems and methods of monitoring account activity in a streaming media environment. An exemplary system includes a monitoring system, an account creation and management system, and an account payment system. The monitoring system is coupled to the account creation and management system and the account payment system via a network. The processing device of the monitoring system retrieves account information for a first user account. Account information includes user consumption information and user payment information associated with the first user account. The processing device determines a fraudulent account score for the first user account based on at least one of the user consumption information, the user payment information, and account identification information.
    Type: Application
    Filed: October 6, 2015
    Publication date: April 6, 2017
    Inventors: Rudra Peram, Jason Chan
  • Patent number: 9614818
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: April 4, 2017
    Assignee: NETFLIX, INC.
    Inventors: Poornaprajna Udupi, Jason Chan, Jay Zarfoss
  • Publication number: 20160351048
    Abstract: A system and method are provided for connecting intersections, to enable two-way wireless communication between a cloud-based traffic operations service and new and existing traffic cabinet hardware using “connected intersection” technology. By providing hardware in existing (or new) traffic control cabinets that can communicate wirelessly with a cloud-based traffic operations system, customers can enhance and upgrade legacy traffic networks using existing IT infrastructure (i.e. servers, hard drives, etc.) or existing communication networks. The connected intersection technology further provides software functionalities including real-time alerts, connectivity between existing cabinets and central systems, and signal timing-plan management for customers that lack an existing central system.
    Type: Application
    Filed: May 9, 2016
    Publication date: December 1, 2016
    Inventors: David THOMPSON, Tyler ABBOTT, Kashif UMER, David HILLIS, Roy LEMKE, Jason CHAN
  • Publication number: 20160169948
    Abstract: A method and apparatus for measuring power in an electronic device is provided. A voltage is sensed across a sense resistor and the current is then calculated by dividing the sensed voltage by the value of the sense resistor. The method incorporates a buffer for storing the sensed voltage and calculated current. In addition, the buffer permits the measurements to be taken while the electronic device is in a sleep state. The measurements that may be taken include voltage, current, and power.
    Type: Application
    Filed: December 10, 2014
    Publication date: June 16, 2016
    Inventors: Joshua Thielen, Glenn Stroz, Lawrence King, Jason Chan, Shuangquan Wang
  • Publication number: 20160088020
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Application
    Filed: September 24, 2014
    Publication date: March 24, 2016
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Publication number: 20160015935
    Abstract: A vascular access system includes a catheter having an inner lumen in communication with an open distal end; a guidewire at least partially positioned in the catheter lumen and extending out the open distal end thereof, respective proximal and distal stops secured to the guidewire; and a centering device slidably mounted on the guidewire such that the centering device may freely within the catheter lumen relative to the guidewire between the proximal and distal stops, wherein the centering device substantially aligns a longitudinal axis of the catheter with a longitudinal axis of the guidewire proximate the centering device.
    Type: Application
    Filed: July 14, 2015
    Publication date: January 21, 2016
    Inventors: Jason Chan, Huey Chan
  • Publication number: 20150333904
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Application
    Filed: July 27, 2015
    Publication date: November 19, 2015
    Inventors: Poornaprajna UDUPI, Jason CHAN, Jay ZARFOSS
  • Publication number: 20150235035
    Abstract: A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed computing architecture. The security application monitors various classes of resources utilized by the collection of nodes within the distributed computing architecture and determine whether utilization of a class of resources is approaching a pre-determined maximum limit. The security application performs a vulnerability scan of a networked application to determine whether the networked application is prone to a risk of intentional or inadvertent breach by an external application. The security application scans a distributed computing architecture for the existence of access control lists (ACLs), and stores ACL configurations and configuration changes in a database.
    Type: Application
    Filed: May 4, 2015
    Publication date: August 20, 2015
    Inventors: Ariel TSEITLIN, Roy RAPOPORT, Jason CHAN
  • Patent number: 9094377
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Grant
    Filed: August 16, 2013
    Date of Patent: July 28, 2015
    Assignee: NETFLIX, INC.
    Inventors: Poornaprajna Udupi, Jason Chan, Jay Zarfoss