Patents by Inventor Jason Hong
Jason Hong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11926619Abstract: The present disclosure provides novel pladienolide compounds, pharmaceutical compositions containing such compounds, and methods for using the compounds as therapeutic agents. These compounds may be useful in the treatment of cancers, particularly cancers in which agents that target the spliceosome and mutations therein are known to be useful. Also provided herein are methods of treating cancers by administering at least one compound disclosed herein and at least one additional therapy.Type: GrantFiled: April 8, 2019Date of Patent: March 12, 2024Assignee: Eisai R & D Management Co., Ltd.Inventors: Gregg F. Keaney, John Wang, Baudouin Gerard, Kenzo Arai, Xiang Liu, Guo Zhu Zheng, Kazunobu Kira, Lisa A. Marcaurelle, Marta Nevalainen, Ming-Hong Hao, Morgan Welzel O'Shea, Parcharee Tivitmahaisoon, Sudeep Prajapati, Tuoping Luo, Nicholas C. Gearhart, Jason T. Lowe, Yoshihiko Kotake, Satoshi Nagao, Regina Mikie Kanada Sonobe, Masayuki Miyano, Norio Murai, Andrew Cook, Shelby Ellery, Atsushi Endo, James Palacino, Dominic Reynolds
-
Publication number: 20220259082Abstract: The present disclosure relates to the field of chemical compounds, compositions and processes. More specifically, the present disclosure relates to compositions having a high-loading capacity in an aqueous medium and to compositions, processes and uses thereof as silica coagulants in hydrometallurgical process streams.Type: ApplicationFiled: August 27, 2020Publication date: August 18, 2022Inventors: Ken DEUTSCHER, Sasha BOSKOVIC, Andrew COVENEY, Jason HONG, Salvatore LAZZARO, Kate TILDESLEY
-
Publication number: 20220210181Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.Type: ApplicationFiled: March 14, 2022Publication date: June 30, 2022Inventors: Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Frederick Wescoe, Jason R. Brubaker, Jason Hong
-
Patent number: 11310261Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.Type: GrantFiled: June 24, 2020Date of Patent: April 19, 2022Assignee: Proofpoint, Inc.Inventors: Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Publication number: 20220013036Abstract: A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model. When the system determines that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario.Type: ApplicationFiled: September 27, 2021Publication date: January 13, 2022Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Patent number: 11158207Abstract: A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model. When the system determines that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario.Type: GrantFiled: November 13, 2017Date of Patent: October 26, 2021Assignee: Proofpoint, Inc.Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Publication number: 20210021632Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.Type: ApplicationFiled: June 24, 2020Publication date: January 21, 2021Inventors: Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Patent number: 10856577Abstract: A product use and behavior instrument includes a housing defining a central compartment therein. A controller is positioned within the central compartment. The controller includes a first connector. The first connector is configured to operatively and removably couple the product use and behavior instrument to a battery element. A second connector is configured to operatively and removably couple the product use and behavior instrument to a tank element. A sensor circuit is structured to collect at least one use data characteristic of a smoking action. The smoking action is associated with use of at least one of the tank and battery element. Local memory is structured to store the at least one use data characteristic of the smoking action. A communication interface is structured to communicate the stored at least one use data characteristic of the smoking action to a remote computing device.Type: GrantFiled: September 20, 2017Date of Patent: December 8, 2020Assignee: RAI STRATEGIC HOLDINGS, INC.Inventors: Jeffrey Sean Smith, Steven L. Alderman, Sarah A. Baxter-Wright, John Darnell, Kyung Soo (Jason) Hong, Paul R. Nelson, Elaine K. Round, Stephen B. Sears, Rajesh Sur
-
Patent number: 10810295Abstract: A system for automatic authentication of a user to allow access to websites and physical devices which provides tiered levels of security and defines an API protocol for exchange of authentication credentials.Type: GrantFiled: February 19, 2016Date of Patent: October 20, 2020Assignee: CARNEGIE MELLON UNIVERSITYInventors: Eiji Hayashi, Jason Hong
-
Patent number: 10749887Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.Type: GrantFiled: April 20, 2017Date of Patent: August 18, 2020Assignee: Proofpoint, Inc.Inventors: Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Publication number: 20190087302Abstract: A product use and behavior instrument includes a housing defining a central compartment therein. A controller is positioned within the central compartment. The controller includes a connector. The connector is configured to operatively and removably couple the product use and behavior instrument to an electronic smoking article. The electronic smoking article includes a heating element to heat a tobacco product. The electronic smoking article includes a battery. A sensor circuit is structured to collect at least one use data characteristic of a smoking action. The smoking action is associated with use of at least one of the heating element and battery. Local memory is structured to store the at least one use data characteristic of the smoking action. A communication interface is structured to communicate the stored at least one use data characteristic of the smoking action to a remote computing device.Type: ApplicationFiled: February 8, 2018Publication date: March 21, 2019Inventors: Jeffrey Sean Smith, Steven L. ALDERMAN, Paul A. BRINKLEY, Sarah A. BAXTER-WRIGHT, Kyung Soo (Jason) HONG, Paul R. NELSON, Stephen B. SEARS, Rajesh SUR
-
Publication number: 20190082737Abstract: A product use and behavior instrument includes a housing defining a central compartment therein. A controller is positioned within the central compartment. The controller includes a first connector. The first connector is configured to operatively and removably couple the product use and behavior instrument to a battery element. A second connector is configured to operatively and removably couple the product use and behavior instrument to a tank element. A sensor circuit is structured to collect at least one use data characteristic of a smoking action. The smoking action is associated with use of at least one of the tank and battery element. Local memory is structured to store the at least one use data characteristic of the smoking action. A communication interface is structured to communicate the stored at least one use data characteristic of the smoking action to a remote computing device.Type: ApplicationFiled: September 20, 2017Publication date: March 21, 2019Inventors: Jeffrey Sean Smith, Steven L. Alderman, Sarah A. Baxter-Wright, John Darnell, Kyung Soo (Jason) Hong, Paul R. Nelson, Elaine K. Round, Stephen B. Sears, Rajesh Sur
-
Patent number: 9870715Abstract: A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model. When the system determines that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario.Type: GrantFiled: January 30, 2017Date of Patent: January 16, 2018Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Publication number: 20180004928Abstract: A system for automatic authentication of a user to allow access to websites and physical devices which provides tiered levels of security and defines an API protocol for exchange of authentication credentials.Type: ApplicationFiled: February 19, 2016Publication date: January 4, 2018Applicant: CARNEGIE MELLON UNIVERSITYInventors: Eiji Hayashi, Jason Hong
-
Patent number: 9824609Abstract: A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.Type: GrantFiled: December 23, 2016Date of Patent: November 21, 2017Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Publication number: 20170244746Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.Type: ApplicationFiled: April 20, 2017Publication date: August 24, 2017Inventors: Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Publication number: 20170140663Abstract: A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model. When the system determines that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario.Type: ApplicationFiled: January 30, 2017Publication date: May 18, 2017Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Publication number: 20170103674Abstract: A system assessing the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When the a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and us the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.Type: ApplicationFiled: December 23, 2016Publication date: April 13, 2017Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Patent number: 9558677Abstract: A training system senses a user action that may expose the user to a threat, such as a cybersecurity threat. The user action may be in response to a mock attack delivered via a messaging service, a wireless communication service, a fake malware application or another device, service, system or mechanism. The system selects a training action from a collection of available training actions and causes the training action to be delivered to the user.Type: GrantFiled: March 17, 2014Date of Patent: January 31, 2017Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Patent number: 9547998Abstract: Context-aware training systems, apparatuses and systems. The context-aware training systems, apparatuses and systems are computer-implemented and include sensing a user action and, based on a training needs model, estimating a cost or benefit to exposing the user to a training action, selecting a training action from a collection of available training actions and delivering the training action to the user if the user action indicates a need for the user to be trained and the cost or benefit to exposing the user to the training action indicates user exposure to the training action is warranted.Type: GrantFiled: April 9, 2012Date of Patent: January 17, 2017Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong