Patents by Inventor Brian Wu

Brian Wu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240244084
    Abstract: Inferential analysis includes: assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements, automatically determining, based on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy; and automatically recommending, based on the assessed risk, a computer network change to reduce the assessed risk.
    Type: Application
    Filed: November 17, 2023
    Publication date: July 18, 2024
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco, JR.
  • Patent number: 11863590
    Abstract: Inferential analysis includes: assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements, automatically determining, based on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy; and automatically recommending, based on the assessed risk, a computer network change to reduce the assessed risk.
    Type: Grant
    Filed: September 16, 2021
    Date of Patent: January 2, 2024
    Assignee: Guidewire Software, Inc.
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco, Jr.
  • Publication number: 20230005082
    Abstract: One embodiment provides a computing device for remote experiential teambuilding activities. The computing device includes a communication circuitry and a user interface (UI). The communication circuitry is configured to couple to a remote computing device via a network. The remote computing device is associated with a remote participant. The UI is configured to receive a local user input from a local participant, and to provide at least one of a local device output or a remote device output to the local participant. The local user input, local device output and remote device output are related to a selected experiential activity.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 5, 2023
    Applicant: Rensselaer Polytechnic Institute
    Inventors: Lisa Sulmasy, Cassandra Smith, MacKenzie Grenier, Timothy Cieslak, Gabriela Interian, Christine Koulopoulos, Brian Wu, Parker Shawver
  • Publication number: 20220203244
    Abstract: Methods and systems for cross-platform user profiling based on disparate datasets using machine learning models. Specifically, the system may monitor native asset data of an asset corresponding to a cross-platform profile, wherein the cross-platform profile comprises a profile linked to an account, for a user, that is used across multiple assets. The system may detect, using a machine learning model, an incident of the user based on telemetry data extracted from the native asset data. The system may update a status of the cross-platform profile based on the incident. The system may generate for presentation, in a user interface for the account, the status of cross-platform profile and reconstructed asset data based on the incident.
    Type: Application
    Filed: December 31, 2020
    Publication date: June 30, 2022
    Applicant: GGWP, Inc.
    Inventors: George Ng, Brian Wu
  • Publication number: 20220006840
    Abstract: Inferential analysis includes: assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements, automatically determining, based on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy; and automatically recommending, based on the assessed risk, a computer network change to reduce the assessed risk.
    Type: Application
    Filed: September 16, 2021
    Publication date: January 6, 2022
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco, JR.
  • Patent number: 11153349
    Abstract: Inferential analysis includes: assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements; automatically determining, based on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy; and automatically recommending, based on the assessed risk, a computer network change to reduce the assessed risk.
    Type: Grant
    Filed: October 24, 2019
    Date of Patent: October 19, 2021
    Assignee: Guidewire Software, Inc.
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco, Jr.
  • Patent number: 10997494
    Abstract: Methods and systems for detecting disparate incidents in processed data using a plurality of machine learning models. For example, the system may receive native asset data. The system may extract telemetry data from the native asset data. The system may input the first feature input into a first machine learning model, wherein the first machine learning model is trained to detect known incidents of a first type in a first set of labeled telemetry data. The system may then detect a first incident based on a first output from the first machine learning model, wherein the first incident is a first event in an asset related to the user's behavior.
    Type: Grant
    Filed: December 31, 2020
    Date of Patent: May 4, 2021
    Assignee: GGWP, Inc.
    Inventors: George Ng, Brian Wu, Ling Xiao
  • Publication number: 20200076859
    Abstract: Inferential analysis includes: assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements; automatically determining, based on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy; and automatically recommending, based on the assessed risk, a computer network change to reduce the assessed risk.
    Type: Application
    Filed: October 24, 2019
    Publication date: March 5, 2020
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco, JR.
  • Patent number: 10511635
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments involve using continual or periodic data collecting to improve inferential analysis, as well as obtaining circumstantial or inferential information from social networks. Machine learning may be used to improve predicitive capabilities. Some embodiments allow for identification of an entity from circumstantial or inferential information based on the machine learning and comparative analyses.
    Type: Grant
    Filed: May 4, 2018
    Date of Patent: December 17, 2019
    Assignee: Guidewire Software, Inc.
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco, Jr.
  • Patent number: 10230764
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments involve using continual or periodic data collecting to improve inferential analysis, as well as obtaining circumstantial or inferential information from social networks. Machine learning may be used to improve predicitive capabilities. Some embodiments allow for identification of an entity from circumstantial or inferential information based on the machine learning and comparative analyses.
    Type: Grant
    Filed: December 6, 2016
    Date of Patent: March 12, 2019
    Assignee: Guidewire Software, Inc.
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco, Jr.
  • Publication number: 20190035027
    Abstract: Various embodiments disclosed include, for each entity in a portfolio, receiving entity data indicative of attributes of an entity, determining the received entity data for at least some entities is missing a portion of the entity data required to perform a cyber risk analysis; and synthesizing the missing portion. The method may further include comparing the received entity data and synthesized missing portion for each of the entities to each other; locating clusters of similar entity data shared between two or more of the entities; and calculating a cyber risk score representing how different the entities are to one another based on the entity data that are not shared between entities. Some embodiments include comparing entities that are missing some entity data to entities which have complete entity data, and generating a synthesized portfolio by selecting entities having complete entity data to replace the entities that are missing entity data.
    Type: Application
    Filed: July 26, 2017
    Publication date: January 31, 2019
    Inventors: George Y. Ng, Yoshifumi Yamamoto, Brian Wu, Siddharth R. Ramakrishnan
  • Publication number: 20180359281
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments involve using continual or periodic data collecting to improve inferential analysis, as well as obtaining circumstantial or inferential information from social networks. Machine learning may be used to improve predicitive capabilities. Some embodiments allow for identification of an entity from circumstantial or inferential information based on the machine learning and comparative analyses.
    Type: Application
    Filed: May 4, 2018
    Publication date: December 13, 2018
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco
  • Publication number: 20170085595
    Abstract: Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments involve using continual or periodic data collecting to improve inferential analysis, as well as obtaining circumstantial or inferential information from social networks. Machine learning may be used to improve predicitive capabilities. Some embodiments allow for identification of an entity from circumstantial or inferential information based on the machine learning and comparative analyses.
    Type: Application
    Filed: December 6, 2016
    Publication date: March 23, 2017
    Inventors: George Y. Ng, Brian Wu, Ming Yang, Paul Yang, Fernando Tancioco, JR.
  • Publication number: 20100258606
    Abstract: An adhesive tape cutting device includes a sleeve body having a top wall that has a tape slot defined by a slot-defining wall having a rear edge, front and rear end portions, and a protruded portion disposed between the rear edge and the front end portion. The tape slot separates the rear end portion and the protruded portion. The protruded portion extends outwardly and radially, through a tangent line passing through the rear edge, from one side of the tangent line to the other side of the tangent line. The protruded portion has a planar abutting surface, inclined away from the adhesive tape roll in a forward direction, and having opposite front and rear ends. The rear end is disposed on one side of a first reference line connecting the rear edge and the front end. The front end is disposed on one side of a second reference line connecting the rear edge and a tip of said cutting member.
    Type: Application
    Filed: June 24, 2010
    Publication date: October 14, 2010
    Inventor: Brian WU
  • Publication number: 20090158599
    Abstract: An adhesive tape cutting device includes: a sleeve body sleeved on an adhesive tape roll and having a top wall defining a tape slot, the tape slot being defined by a slot-defining wall having opposite front and rear edges, the top wall having front and rear end portions and a protruded portion disposed between and protruding outwardly from the front end portion and the slot-defining wall, the rear end portion and the protruded portion being separated by the tape slot, the protruded portion extending outwardly and radially through a tangent line from one side of the tangent line to the other side of the tangent line; and a cutting member mounted on the front end portion of the top wall of the sleeve body.
    Type: Application
    Filed: December 19, 2007
    Publication date: June 25, 2009
    Inventor: Brian Wu