Patents by Inventor Fernando Vargas

Fernando Vargas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240016755
    Abstract: The present invention relates to a method for rapidly obtaining albumin nanoparticles loaded with magnetic nanoparticles, which comprises steps with ultra-high speed agitation. This method allows obtaining said nanoparticles in less than minutes with encapsulation efficiency higher than 90%.
    Type: Application
    Filed: August 27, 2021
    Publication date: January 18, 2024
    Inventors: Patricio Fernando VARGAS CANTÍN, Patricia Susana DIAZ SALDIVAR
  • Patent number: 11520169
    Abstract: An implementation of an optical system for expanding the field of view can include a first optical element and a second optical element. The first optical element can include a first surface and a second surface. The first surface can be configured to reflect a first light beam incident on the first surface at a first incident angle greater than a first predetermined angle, and the second surface can be configured to reflect the reflected first light beam towards a location. The second optical element can include a third surface and a fourth surface. The third surface can be configured to reflect a second light beam incident on the third surface at a second incident angle greater than a second predetermined angle, and the fourth surface can be configured to reflect the reflected second light beam towards the location. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: October 11, 2018
    Date of Patent: December 6, 2022
    Assignees: THE SCHEPENS EYE RESEARCH INSTITUTE, INC., THE UNIVERSITY OF MURCIA
    Inventors: Eliezer Peli, Fernando Vargas-Martin
  • Publication number: 20220287238
    Abstract: Lawnmowers are provided. A lawnmower includes a seat configured to receive a lawnmower operator; a mowing deck having one or more cutting implements and a discharge chute; and a bagging system in fluid communication with the discharge chute through a tube, wherein the lawnmower has a first configuration when the tube is coupled to the lawnmower, wherein the lawnmower has a second configuration when the tube is not coupled to the lawnmower, wherein the tube is disposed at a lateral side of the lawnmower in the first configuration, wherein the lawnmower defines a maximum lateral width in a lateral direction, and wherein the lateral width is less than 38 inches in both the first configuration and the second configuration.
    Type: Application
    Filed: February 14, 2022
    Publication date: September 15, 2022
    Inventors: Nikolas Mika, Grzegorz Kondro, Matt Lambert, Maxwell McCammon, Michael Feng, Ron Hoffman, Fernando Vargas, Steve Holland, Ashlyn Hogg
  • Patent number: 11314860
    Abstract: Anti-impersonation techniques using device-context information and user behavior information from a session. The session can include a time period where a user of the client computer is performing an activity on the client computer (e.g., the session includes the user logging into an account online). The behavior information can include information on ways the user uses user input devices during the session. The device-context information can include HTTP session information. The techniques can include generating feature vector(s) for the received information, and comparing the feature vector(s) against model(s) of related historical information. The comparisons can provide level(s) of deviation of the feature vector(s) from the model(s). Also, the techniques can include determining whether the session is anomalous or normal according to the level(s) of deviation, and performing a security action in response to determining the session is anomalous.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: April 26, 2022
    Assignee: Easy Solutions Enterprises Corp.
    Inventors: Alejandro Correa Bahnsen, Luis David Camacho Gonzalez, Claudio Deiro, Martin Ochoa Ronderos, Jesus Alberto Solano Gomez, Javier Fernando Vargas Gonzalez
  • Patent number: 11178163
    Abstract: The disclosed techniques utilize round-trip times (RTTs) from back-and-forth communications with distant servers to detect impersonations in a computer network, such as impersonations using IP spoofing. Also, the techniques can use machine learning to enhance analysis in spoofing detection. The techniques can include sending a computer program to a client device. The client device can have an IP address, and the computer program can be executed by the client device after it is received by the client device. The computer program can measure RTTs for messages the computer program sends to multiple pre-selected location servers at different remote or distant locations and for corresponding reply messages that are returned to the computer program. The IP address of the client device and the measured RTTs can then be received and used to determine whether the measured RTTs are anomalous or not; and thus, determine a possible impersonator or a legitimate user.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: November 16, 2021
    Assignee: Easy Solutions Enterprises Corp.
    Inventors: Alejandro Correa Bahnsen, Claudio Deiro, Martín Ochoa Ronderos, Javier Fernando Vargas Gonzalez, Jesus Alberto Solano Gomez
  • Patent number: 11170100
    Abstract: Techniques to remotely detect behavior associated with malware and identify compromised user-sessions, regardless of the malware variant or family, and independently of the page structure.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: November 9, 2021
    Assignee: Easy Solutions Enterprises Corp.
    Inventors: Ivan Dario Fajardo Verano, Claudio Deiro, Javier Fernando Vargas Gonzalez
  • Publication number: 20210199993
    Abstract: An implementation of an optical system for expanding the field of view can include a first optical element and a second optical element. The first optical element can include a first surface and a second surface. The first surface can be configured to reflect a first light beam incident on the first surface at a first incident angle greater than a first predetermined angle, and the second surface can be configured to reflect the reflected first light beam towards a location. The second optical element can include a third surface and a fourth surface. The third surface can be configured to reflect a second light beam incident on the third surface at a second incident angle greater than a second predetermined angle, and the fourth surface can be configured to reflect the reflected second light beam towards the location. Related apparatus, systems, techniques and articles are also described.
    Type: Application
    Filed: October 11, 2018
    Publication date: July 1, 2021
    Applicant: The Schepens Eye Research Institute, Inc.
    Inventors: Eliezer Peli, Fernando Vargas-Martin
  • Publication number: 20210173937
    Abstract: Threat assessment tool that monitors network activity within and arriving at an entity's network and to identify activity that matches known threats or that deviates from the norm. Once a threat is identified, it is reported. If the activity is out of the norm, it is also reported. All of the activity is then stored for further threat assessments to create a feedback loop mechanism that continues to increase the robustness of the assessment.
    Type: Application
    Filed: November 19, 2020
    Publication date: June 10, 2021
    Applicant: LUMU TECHNOLOGIES, INC.
    Inventors: Javier Fernando Vargas, Claudio Deiro, Ricardo Villadiego
  • Publication number: 20210045488
    Abstract: A facial concealment assembly for concealing a user's face when the user is sleeping includes a fitment that is extendable around a user's head. A brim is coupled to the fitment and a screen is removably coupled to the brim. Thus, the screen hangs downwardly from the brim when the fitment is worn on the user's head. The screen has a length of at least 14.0 inches such that the screen covers the user's face and chest when the fitment is worn around the user's head. The screen is comprised of a one-way see through material to conceal the user's face and chest from observers. In this way the user can sleep discretely on public or private transportation.
    Type: Application
    Filed: August 13, 2019
    Publication date: February 18, 2021
    Inventor: Fernando Vargas
  • Publication number: 20210006579
    Abstract: The disclosed techniques utilize round-trip times (RTTs) from back-and-forth communications with distant servers to detect impersonations in a computer network, such as impersonations using IP spoofing. Also, the techniques can use machine learning to enhance analysis in spoofing detection. The techniques can include sending a computer program to a client device. The client device can have an IP address, and the computer program can be executed by the client device after it is received by the client device. The computer program can measure RTTs for messages the computer program sends to multiple pre-selected location servers at different remote or distant locations and for corresponding reply messages that are returned to the computer program. The IP address of the client device and the measured RTTs can then be received and used to determine whether the measured RTTs are anomalous or not; and thus, determine a possible impersonator or a legitimate user.
    Type: Application
    Filed: July 2, 2019
    Publication date: January 7, 2021
    Inventors: Alejandro Correa Bahnsen, Claudio Deiro, Martín Ochoa Ronderos, Javier Fernando Vargas Gonzalez, Jesus Alberto Solano Gomez
  • Publication number: 20200380119
    Abstract: Anti-impersonation techniques using device-context information and user behavior information from a session. The session can include a time period where a user of the client computer is performing an activity on the client computer (e.g., the session includes the user logging into an account online). The behavior information can include information on ways the user uses user input devices during the session. The device-context information can include HTTP session information. The techniques can include generating feature vector(s) for the received information, and comparing the feature vector(s) against model(s) of related historical information. The comparisons can provide level(s) of deviation of the feature vector(s) from the model(s). Also, the techniques can include determining whether the session is anomalous or normal according to the level(s) of deviation, and performing a security action in response to determining the session is anomalous.
    Type: Application
    Filed: May 29, 2019
    Publication date: December 3, 2020
    Inventors: Alejandro Correa Bahnsen, Luis David Camacho Gonzalez, Claudio Deiro, Martín Ochoa Ronderos, Jesus Alberto Solano Gomez, Javier Fernando Vargas Gonzalez
  • Patent number: 10824727
    Abstract: Systems and methods to detect remote access malware activities, via: detecting, in a computing device, first input events in an operating system of the computing device; detecting, in the computing device, second input events received in an application running in the computing device; detecting, in the computing device, a mismatch between the first input events detected in the operating system and the second input events received in the application running in the computing device; and in response to the mismatch being detected, generating an alert indicating a threat of the application being attached by remote access malware.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: November 3, 2020
    Assignee: Easy Solutions Enterprises Corp.
    Inventor: Javier Fernando Vargas Gonzalez
  • Patent number: 10645117
    Abstract: Systems and methods to detect the identities of victims of phishing activities, in which embedding, in an item, an element having a reference to a server, is embedded in an item (e.g., a webpage or a mobile application) that may be copied by attackers. When used on a user computer, the element generates a request to the server. Based on the request, the server identifies a user of the element embedded in the item or a copy of the item. Based on uses of the element, the server tracks a history of the user using the item or the copy of the item. In response to a determination that the element is currently being used by the user in the item and the history indicates that the user has used the copy of the item, the server identifies the user as a victim of the copy of the item.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: May 5, 2020
    Assignee: Easy Solutions Enterprises Corp.
    Inventor: Javier Fernando Vargas Gonzalez
  • Patent number: 10289846
    Abstract: Systems and methods to detect remote access malware activities, via: detecting, in a computing device, first input events in an operating system of the computing device; detecting, in the computing device, second input events received in an application running in the computing device; detecting, in the computing device, a mismatch between the first input events detected in the operating system and the second input events received in the application running in the computing device; and in response to the mismatch being detected, generating an alert indicating a threat of the application being attached by remote access malware.
    Type: Grant
    Filed: April 15, 2016
    Date of Patent: May 14, 2019
    Assignee: EASY SOLUTIONS ENTERPRISES CORP.
    Inventor: Javier Fernando Vargas Gonzalez
  • Publication number: 20190132356
    Abstract: Systems and methods to detect the identities of victims of phishing activities, in which embedding, in an item, an element having a reference to a server, is embedded in an item (e.g., a webpage or a mobile application) that may be copied by attackers. When used on a user computer, the element generates a request to the server. Based on the request, the server identifies a user of the element embedded in the item or a copy of the item. Based on uses of the element, the server tracks a history of the user using the item or the copy of the item. In response to a determination that the element is currently being used by the user in the item and the history indicates that the user has used the copy of the item, the server identifies the user as a victim of the copy of the item.
    Type: Application
    Filed: October 26, 2017
    Publication date: May 2, 2019
    Inventor: Javier Fernando Vargas Gonzalez
  • Patent number: 10102367
    Abstract: Among other things, embodiments of the present disclosure help provide entities with the ability to remotely detect behavior associated with malware and identify compromised user-sessions, regardless of the malware variant or family, and independently of the page structure.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: October 16, 2018
    Assignee: EASY SOLUTIONS ENTERPRISES CORP.
    Inventors: Ivan Dario Fajardo Verano, Claudio Deiro, Javier Fernando Vargas Gonzalez
  • Publication number: 20180012018
    Abstract: Among other things, embodiments of the present disclosure help provide entities with the ability to remotely detect behavior associated with malware and identify compromised user-sessions, regardless of the malware variant or family, and independently of the page structure.
    Type: Application
    Filed: September 6, 2017
    Publication date: January 11, 2018
    Inventors: Ivan Dario Fajardo Verano, Claudio Deiro, Javier Fernando Vargas Gonzalez
  • Patent number: 9798875
    Abstract: Among other things, embodiments of the present disclosure help provide entities with the ability to remotely detect behavior associated with malware and identify compromised user-sessions, regardless of the malware variant or family, and independently of the page structure.
    Type: Grant
    Filed: May 19, 2015
    Date of Patent: October 24, 2017
    Assignee: EASY SOLUTIONS ENTERPRISES CORP.
    Inventors: Ivan Dario Fajardo Verano, Claudio Deiro, Javier Fernando Vargas Gonzalez
  • Publication number: 20170010471
    Abstract: An adapter device is provided to be disposed on the wearer's head. A mobile phone or other mobile graphical device can be inserted in the front of the device so this is opposite the user's eyes at a short distance. The device also incorporates lenses and adjustment mechanisms of the lenses that allow proper display of the graphic display device that is inserted in the adapter. Thus the device is designed to achieve stereoscopic 3D vision, configuring the adapter assembly and the device graphic as a device that allows multiplexing (two or more information channels on a single means of transmission) for position (side-by-side) in a mobile phone or other device with graphic screen TV, merging both visual content and receiving a three-dimensional image.
    Type: Application
    Filed: July 6, 2015
    Publication date: January 12, 2017
    Inventors: Daniel Serrano Canovas, Jose Antonio Garcia Marin, Francisco Alvarez Beltran, Alvaro Redondo Caparros, Jose Francisco Castejon Mochon, Fernando Vargas-Martin
  • Publication number: 20160308888
    Abstract: Systems and methods to detect remote access malware activities, via: detecting, in a computing device, first input events in an operating system of the computing device; detecting, in the computing device, second input events received in an application running in the computing device; detecting, in the computing device, a mismatch between the first input events detected in the operating system and the second input events received in the application running in the computing device; and in response to the mismatch being detected, generating an alert indicating a threat of the application being attached by remote access malware.
    Type: Application
    Filed: April 15, 2016
    Publication date: October 20, 2016
    Inventor: Javier Fernando Vargas Gonzalez