Patents by Inventor James Yun
James Yun has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240087527Abstract: An electronic device may have a display mounted in a housing. The display may have a pixel array that produces images. A display cover layer may overlap the pixel array. The display cover layer may have a planar central area surrounded by a peripheral edge area with a curved cross-sectional profile. From an on-axis viewing angle, an image on the pixel array is fully viewable through the planar central area and the peripheral edge area. From an off-axis viewing angle, the image is partly viewable through the peripheral edge area and not through the central area. To avoid an undesired color cast in the partly viewable image seen through the peripheral edge area of the display cover layer, the display may be provided with color cast compensation structures such as a guest-host liquid crystal layer that exhibits an anisotropic colored light absorption characteristic, a diffuser layer, and/or other optical structures.Type: ApplicationFiled: November 16, 2023Publication date: March 14, 2024Inventors: Sameer Pandya, Daniel J. Barrett, Erik G. de Jong, James P. Landry, David A. Doyle, Jean-Pierre S. Guillou, Jung Yun Seuh, Yi Qiao
-
Patent number: 10116688Abstract: The disclosed computer-implemented method for detecting potentially malicious files may include (1) detecting an attempt by the computing device to execute a file, (2) prior to execution of the file, determining that a filename of the file contains a combination of characters indicative of a false filename extension included within a middle section of the filename, (3) determining, based at least in part on the false filename extension being included within the middle section of the filename, that the file is potentially malicious, and then in response to determining that the file is potentially malicious, (4) preventing the computing device from executing the file. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 24, 2015Date of Patent: October 30, 2018Assignee: Symantec CorporationInventor: James Yun
-
Patent number: 9619649Abstract: The disclosed computer-implemented method for detecting potentially malicious applications may include (1) detecting a request issued by an application running on a client device to download a file from a remote device, (2) determining that the request calls an application programming interface that enables the client device to download the file from the remote device, (3) determining that a parameter passed to the application programming interface in the request has been implicated in a previous attempt to download a known malicious file, and then in response to determining that the parameter has been implicated in a previous attempt to download a known malicious file, (4) classifying the application that issued the request as potentially malicious. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 13, 2015Date of Patent: April 11, 2017Assignee: Symantec CorporationInventor: James Yun
-
Patent number: 9483643Abstract: The disclosed computer-implemented method for creating behavioral signatures used to detect malware may include (1) maintaining a database that identifies (A) known malicious files and behaviors exhibited by the known malicious files and (B) known non-malicious files and behaviors exhibited by the known non-malicious files and (2) creating a behavioral signature used to detect malware by (A) determining a combination of behaviors exhibited by at least one of the known malicious files, (B) identifying the number of known malicious files that exhibit each behavior within the combination, (C) identifying the number of known non-malicious files that exhibit each behavior within the combination, and (D) determining that the number of known malicious files that exhibit each behavior within the combination exceeds the number of known non-malicious files that exhibit each behavior within the combination by a certain threshold. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 13, 2015Date of Patent: November 1, 2016Assignee: Symantec CorporationInventor: James Yun
-
Patent number: 9351301Abstract: Provided are methods by which multiple devices self-form a communication network and self-coordinate their access to communication media. In these methods, an individual node maintains its knowledge of other nodes in its vicinity and knowledge of those nodes' scheduled activities to an adequate degree of details. Such knowledge can be obtained by receiving control signals from nodes that are within the range of wireless communication. Examples of such knowledge include the identities of the nodes in the vicinity, the nodes' scheduled times of control message transmission and/or reception, the nodes' scheduled times of application data transmission and/or reception, etc. Such knowledge can be embodied in the form of a memory module of a computing device.Type: GrantFiled: August 15, 2013Date of Patent: May 24, 2016Inventors: Daniel Chonghwan Lee, Eric James Yun Loong Lee, Ehsan Seyedin
-
Patent number: 8683576Abstract: A computer-implemented method for detecting a process to establish a backdoor connection with the computer is described. An application programming interface (API) is hooked. Calls to the hooked API are monitored. A call directed to the hooked API is intercepted. The call instructs the API to initiate a user interface. Structures included in the intercepted call are analyzed. The intercepted call is prevented from arriving at the hooked API if the structures are directed to a socket on the computer.Type: GrantFiled: September 30, 2009Date of Patent: March 25, 2014Assignee: Symantec CorporationInventor: James Yun
-
Patent number: 8612995Abstract: Method, apparatus, and computer readable medium for monitoring code injection in a computer is described. In some examples, at least one application programming interface (API) call configured to inject data into a process executing on the computer is intercepted. The data is parsed to identify instruction code to be performed by the process. The instruction code is compared with instances of predetermined instruction code to produce a score for the instruction code. The data is prevented from being injected into the process in response to the score satisfying a threshold score. The data may be allowed to be injected into the process in response to the score not satisfying the threshold score.Type: GrantFiled: March 31, 2009Date of Patent: December 17, 2013Assignee: Symantec CorporationInventor: James Yun
-
Publication number: 20120017625Abstract: A system including a primary evaporator facilitating heat transfer by evaporating liquid to obtain vapor is disclosed. The primary evaporator receives a liquid from a liquid line and outputs the vapor to a vapor line. The primary evaporator also outputs excess liquid received from the liquid line to an excess fluid line. A condensing system receives the vapor from the vapor line, and outputs the liquid and excess liquid to the liquid line. The excess liquid is obtained at least partially from a reservoir. A primary loop includes the condensing system, the primary evaporator, the liquid line, and the vapor line, and provides a heat transfer path. Similarly, a secondary loop includes the condensing system, the primary evaporator, the liquid line, the vapor line, and the excess fluid line. The secondary loop provides a venting path for removing undesired vapor within the liquid or excess liquid from the primary evaporator.Type: ApplicationFiled: October 3, 2011Publication date: January 26, 2012Applicant: ALLIANT TECHSYSTEMS INC.Inventors: Edward J. Kroliczek, James Yun, David Bugby, David A. Wolf, SR.
-
Publication number: 20090200006Abstract: A system including a primary evaporator facilitating heat transfer by evaporating liquid to obtain vapor is disclosed. The primary evaporator receives a liquid from a liquid line and outputs the vapor to a vapor line. The primary evaporator also outputs excess liquid received from the liquid line to an excess fluid line. A condensing system receives the vapor from the vapor line, and outputs the liquid and excess liquid to the liquid line. The excess liquid is obtained at least partially from a reservoir. A primary loop includes the condensing system, the primary evaporator, the liquid line, and the vapor line, and provides a heat transfer path. Similarly, a secondary loop includes the condensing system, the primary evaporator, the liquid line, the vapor line, and the excess fluid line. The secondary loop provides a venting path for removing undesired vapor within the liquid or excess liquid from the primary evaporator.Type: ApplicationFiled: April 17, 2009Publication date: August 13, 2009Applicant: ALLIANT TECHSYSTEMS INC.Inventors: Edward J. Kroliczek, James Yun, David Bugby, David A. Wolf, Sr.
-
Patent number: 7549461Abstract: A system including a primary evaporator facilitating heat transfer by evaporating liquid to obtain vapor is disclosed. The primary evaporator receives a liquid from a liquid line and outputs the vapor to a vapor line. The primary evaporator also outputs excess liquid received from the liquid line to an excess fluid line. A condensing system receives the vapor from the vapor line, and outputs the liquid and excess liquid to the liquid line. The excess liquid is obtained at least partially from a reservoir. A primary loop includes the condensing system, the primary evaporator, the liquid line, and the vapor line, and provides a heat transfer path. Similarly, a secondary loop includes the condensing system, the primary evaporator, the liquid line, the vapor line, and the excess fluid line. The secondary loop provides a venting path for removing undesired vapor within the liquid or excess liquid from the primary evaporator.Type: GrantFiled: July 14, 2004Date of Patent: June 23, 2009Assignee: Alliant Techsystems Inc.Inventors: Edward J. Kroliczek, James Yun, David Bugby, David A. Wolf, Sr.
-
Publication number: 20050166399Abstract: A method of making an evaporator includes orienting a vapor barrier wall, orienting a liquid barrier wall, and positioning a wick between the vapor barrier wall and the liquid barrier wall. The vapor barrier wall is oriented such that a heat-absorbing surface of the vapor barrier wall defines at least a portion of an exterior surface of the evaporator. The exterior surface is configured to receive heat. The liquid barrier wall is oriented adjacent the vapor barrier wall. The liquid barrier wall has a surface configured to confine liquid. A vapor removal channel is defined at an interface between the wick and the vapor barrier wall. A liquid flow channel is defined between the liquid barrier wall and the primary wick.Type: ApplicationFiled: October 28, 2004Publication date: August 4, 2005Inventors: Edward Kroliczek, James Yun, Michael Nikitkin, David Wolf
-
Publication number: 20050061487Abstract: A system includes a primary evaporator facilitating heat transfer by evaporating liquid to obtain vapor. The primary evaporator receives the liquid from a liquid line and outputs the vapor to a vapor line. The primary evaporator also outputs excess liquid received from the liquid line to an excess fluid line. A condensing system receives the vapor from the vapor line, and outputs the liquid and excess liquid to the liquid line. The excess liquid is obtained at least partially from a reservoir. A primary loop includes the condensing system, the primary evaporator, the liquid line, and the vapor line, and provides a heat transfer path. Similarly, a secondary loop includes the condensing system, the primary evaporator, the liquid line, the vapor line, and the excess fluid line. The secondary loop provides a venting path for removing undesired vapor within the liquid or excess liquid from the primary evaporator.Type: ApplicationFiled: July 14, 2004Publication date: March 24, 2005Inventors: Edward Kroliczek, James Yun, David Bugby, David Wolf
-
Patent number: D1016608Type: GrantFiled: May 9, 2022Date of Patent: March 5, 2024Assignee: GILEAD SCIENCES, INC.Inventors: Benjamin Luke Kozub, Brian Nilstoft, Kevin Nguyen, James Paul Oberhauser, Roman Shumylo, Joseph Anthony Cordova, Jinhui Yun, William Harold Lizor, Jr., Adam Hilborn, Jesse Arnold Fourt, Léo Boris Marzolf, Pratap Uday Ganapathy, Brooke Genelle Thyng, Caricia Catalani, Soizic Porhel, Jose Angel Meza, Steven M. Scally, Mary Cassandra Lodwick
-
Patent number: D1019381Type: GrantFiled: June 14, 2022Date of Patent: March 26, 2024Assignee: GILEAD SCIENCES, INC.Inventors: Benjamin Luke Kozub, Brian Nilstoft, Kevin Nguyen, James Paul Oberhauser, Roman Shumylo, Joseph Anthony Cordova, Jinhui Yun, William Harold Lizor, Jr., Adam Hilborn, Jesse Arnold Fourt, Léo Boris Marzolf, Pratap Uday Ganapathy, Brooke Genelle Thyng, Caricia Catalani, Soizic Porhel, Jose Angel Meza, Steven M. Scally, Mary Cassandra Lodwick