Patents by Inventor James Yun

James Yun has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240087527
    Abstract: An electronic device may have a display mounted in a housing. The display may have a pixel array that produces images. A display cover layer may overlap the pixel array. The display cover layer may have a planar central area surrounded by a peripheral edge area with a curved cross-sectional profile. From an on-axis viewing angle, an image on the pixel array is fully viewable through the planar central area and the peripheral edge area. From an off-axis viewing angle, the image is partly viewable through the peripheral edge area and not through the central area. To avoid an undesired color cast in the partly viewable image seen through the peripheral edge area of the display cover layer, the display may be provided with color cast compensation structures such as a guest-host liquid crystal layer that exhibits an anisotropic colored light absorption characteristic, a diffuser layer, and/or other optical structures.
    Type: Application
    Filed: November 16, 2023
    Publication date: March 14, 2024
    Inventors: Sameer Pandya, Daniel J. Barrett, Erik G. de Jong, James P. Landry, David A. Doyle, Jean-Pierre S. Guillou, Jung Yun Seuh, Yi Qiao
  • Patent number: 10116688
    Abstract: The disclosed computer-implemented method for detecting potentially malicious files may include (1) detecting an attempt by the computing device to execute a file, (2) prior to execution of the file, determining that a filename of the file contains a combination of characters indicative of a false filename extension included within a middle section of the filename, (3) determining, based at least in part on the false filename extension being included within the middle section of the filename, that the file is potentially malicious, and then in response to determining that the file is potentially malicious, (4) preventing the computing device from executing the file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 24, 2015
    Date of Patent: October 30, 2018
    Assignee: Symantec Corporation
    Inventor: James Yun
  • Patent number: 9619649
    Abstract: The disclosed computer-implemented method for detecting potentially malicious applications may include (1) detecting a request issued by an application running on a client device to download a file from a remote device, (2) determining that the request calls an application programming interface that enables the client device to download the file from the remote device, (3) determining that a parameter passed to the application programming interface in the request has been implicated in a previous attempt to download a known malicious file, and then in response to determining that the parameter has been implicated in a previous attempt to download a known malicious file, (4) classifying the application that issued the request as potentially malicious. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 13, 2015
    Date of Patent: April 11, 2017
    Assignee: Symantec Corporation
    Inventor: James Yun
  • Patent number: 9483643
    Abstract: The disclosed computer-implemented method for creating behavioral signatures used to detect malware may include (1) maintaining a database that identifies (A) known malicious files and behaviors exhibited by the known malicious files and (B) known non-malicious files and behaviors exhibited by the known non-malicious files and (2) creating a behavioral signature used to detect malware by (A) determining a combination of behaviors exhibited by at least one of the known malicious files, (B) identifying the number of known malicious files that exhibit each behavior within the combination, (C) identifying the number of known non-malicious files that exhibit each behavior within the combination, and (D) determining that the number of known malicious files that exhibit each behavior within the combination exceeds the number of known non-malicious files that exhibit each behavior within the combination by a certain threshold. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 13, 2015
    Date of Patent: November 1, 2016
    Assignee: Symantec Corporation
    Inventor: James Yun
  • Patent number: 9351301
    Abstract: Provided are methods by which multiple devices self-form a communication network and self-coordinate their access to communication media. In these methods, an individual node maintains its knowledge of other nodes in its vicinity and knowledge of those nodes' scheduled activities to an adequate degree of details. Such knowledge can be obtained by receiving control signals from nodes that are within the range of wireless communication. Examples of such knowledge include the identities of the nodes in the vicinity, the nodes' scheduled times of control message transmission and/or reception, the nodes' scheduled times of application data transmission and/or reception, etc. Such knowledge can be embodied in the form of a memory module of a computing device.
    Type: Grant
    Filed: August 15, 2013
    Date of Patent: May 24, 2016
    Inventors: Daniel Chonghwan Lee, Eric James Yun Loong Lee, Ehsan Seyedin
  • Patent number: 8683576
    Abstract: A computer-implemented method for detecting a process to establish a backdoor connection with the computer is described. An application programming interface (API) is hooked. Calls to the hooked API are monitored. A call directed to the hooked API is intercepted. The call instructs the API to initiate a user interface. Structures included in the intercepted call are analyzed. The intercepted call is prevented from arriving at the hooked API if the structures are directed to a socket on the computer.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: March 25, 2014
    Assignee: Symantec Corporation
    Inventor: James Yun
  • Patent number: 8612995
    Abstract: Method, apparatus, and computer readable medium for monitoring code injection in a computer is described. In some examples, at least one application programming interface (API) call configured to inject data into a process executing on the computer is intercepted. The data is parsed to identify instruction code to be performed by the process. The instruction code is compared with instances of predetermined instruction code to produce a score for the instruction code. The data is prevented from being injected into the process in response to the score satisfying a threshold score. The data may be allowed to be injected into the process in response to the score not satisfying the threshold score.
    Type: Grant
    Filed: March 31, 2009
    Date of Patent: December 17, 2013
    Assignee: Symantec Corporation
    Inventor: James Yun
  • Publication number: 20120017625
    Abstract: A system including a primary evaporator facilitating heat transfer by evaporating liquid to obtain vapor is disclosed. The primary evaporator receives a liquid from a liquid line and outputs the vapor to a vapor line. The primary evaporator also outputs excess liquid received from the liquid line to an excess fluid line. A condensing system receives the vapor from the vapor line, and outputs the liquid and excess liquid to the liquid line. The excess liquid is obtained at least partially from a reservoir. A primary loop includes the condensing system, the primary evaporator, the liquid line, and the vapor line, and provides a heat transfer path. Similarly, a secondary loop includes the condensing system, the primary evaporator, the liquid line, the vapor line, and the excess fluid line. The secondary loop provides a venting path for removing undesired vapor within the liquid or excess liquid from the primary evaporator.
    Type: Application
    Filed: October 3, 2011
    Publication date: January 26, 2012
    Applicant: ALLIANT TECHSYSTEMS INC.
    Inventors: Edward J. Kroliczek, James Yun, David Bugby, David A. Wolf, SR.
  • Publication number: 20090200006
    Abstract: A system including a primary evaporator facilitating heat transfer by evaporating liquid to obtain vapor is disclosed. The primary evaporator receives a liquid from a liquid line and outputs the vapor to a vapor line. The primary evaporator also outputs excess liquid received from the liquid line to an excess fluid line. A condensing system receives the vapor from the vapor line, and outputs the liquid and excess liquid to the liquid line. The excess liquid is obtained at least partially from a reservoir. A primary loop includes the condensing system, the primary evaporator, the liquid line, and the vapor line, and provides a heat transfer path. Similarly, a secondary loop includes the condensing system, the primary evaporator, the liquid line, the vapor line, and the excess fluid line. The secondary loop provides a venting path for removing undesired vapor within the liquid or excess liquid from the primary evaporator.
    Type: Application
    Filed: April 17, 2009
    Publication date: August 13, 2009
    Applicant: ALLIANT TECHSYSTEMS INC.
    Inventors: Edward J. Kroliczek, James Yun, David Bugby, David A. Wolf, Sr.
  • Patent number: 7549461
    Abstract: A system including a primary evaporator facilitating heat transfer by evaporating liquid to obtain vapor is disclosed. The primary evaporator receives a liquid from a liquid line and outputs the vapor to a vapor line. The primary evaporator also outputs excess liquid received from the liquid line to an excess fluid line. A condensing system receives the vapor from the vapor line, and outputs the liquid and excess liquid to the liquid line. The excess liquid is obtained at least partially from a reservoir. A primary loop includes the condensing system, the primary evaporator, the liquid line, and the vapor line, and provides a heat transfer path. Similarly, a secondary loop includes the condensing system, the primary evaporator, the liquid line, the vapor line, and the excess fluid line. The secondary loop provides a venting path for removing undesired vapor within the liquid or excess liquid from the primary evaporator.
    Type: Grant
    Filed: July 14, 2004
    Date of Patent: June 23, 2009
    Assignee: Alliant Techsystems Inc.
    Inventors: Edward J. Kroliczek, James Yun, David Bugby, David A. Wolf, Sr.
  • Publication number: 20050166399
    Abstract: A method of making an evaporator includes orienting a vapor barrier wall, orienting a liquid barrier wall, and positioning a wick between the vapor barrier wall and the liquid barrier wall. The vapor barrier wall is oriented such that a heat-absorbing surface of the vapor barrier wall defines at least a portion of an exterior surface of the evaporator. The exterior surface is configured to receive heat. The liquid barrier wall is oriented adjacent the vapor barrier wall. The liquid barrier wall has a surface configured to confine liquid. A vapor removal channel is defined at an interface between the wick and the vapor barrier wall. A liquid flow channel is defined between the liquid barrier wall and the primary wick.
    Type: Application
    Filed: October 28, 2004
    Publication date: August 4, 2005
    Inventors: Edward Kroliczek, James Yun, Michael Nikitkin, David Wolf
  • Publication number: 20050061487
    Abstract: A system includes a primary evaporator facilitating heat transfer by evaporating liquid to obtain vapor. The primary evaporator receives the liquid from a liquid line and outputs the vapor to a vapor line. The primary evaporator also outputs excess liquid received from the liquid line to an excess fluid line. A condensing system receives the vapor from the vapor line, and outputs the liquid and excess liquid to the liquid line. The excess liquid is obtained at least partially from a reservoir. A primary loop includes the condensing system, the primary evaporator, the liquid line, and the vapor line, and provides a heat transfer path. Similarly, a secondary loop includes the condensing system, the primary evaporator, the liquid line, the vapor line, and the excess fluid line. The secondary loop provides a venting path for removing undesired vapor within the liquid or excess liquid from the primary evaporator.
    Type: Application
    Filed: July 14, 2004
    Publication date: March 24, 2005
    Inventors: Edward Kroliczek, James Yun, David Bugby, David Wolf
  • Patent number: D1016608
    Type: Grant
    Filed: May 9, 2022
    Date of Patent: March 5, 2024
    Assignee: GILEAD SCIENCES, INC.
    Inventors: Benjamin Luke Kozub, Brian Nilstoft, Kevin Nguyen, James Paul Oberhauser, Roman Shumylo, Joseph Anthony Cordova, Jinhui Yun, William Harold Lizor, Jr., Adam Hilborn, Jesse Arnold Fourt, Léo Boris Marzolf, Pratap Uday Ganapathy, Brooke Genelle Thyng, Caricia Catalani, Soizic Porhel, Jose Angel Meza, Steven M. Scally, Mary Cassandra Lodwick
  • Patent number: D1019381
    Type: Grant
    Filed: June 14, 2022
    Date of Patent: March 26, 2024
    Assignee: GILEAD SCIENCES, INC.
    Inventors: Benjamin Luke Kozub, Brian Nilstoft, Kevin Nguyen, James Paul Oberhauser, Roman Shumylo, Joseph Anthony Cordova, Jinhui Yun, William Harold Lizor, Jr., Adam Hilborn, Jesse Arnold Fourt, Léo Boris Marzolf, Pratap Uday Ganapathy, Brooke Genelle Thyng, Caricia Catalani, Soizic Porhel, Jose Angel Meza, Steven M. Scally, Mary Cassandra Lodwick