Patents by Inventor Jason Hong

Jason Hong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11926619
    Abstract: The present disclosure provides novel pladienolide compounds, pharmaceutical compositions containing such compounds, and methods for using the compounds as therapeutic agents. These compounds may be useful in the treatment of cancers, particularly cancers in which agents that target the spliceosome and mutations therein are known to be useful. Also provided herein are methods of treating cancers by administering at least one compound disclosed herein and at least one additional therapy.
    Type: Grant
    Filed: April 8, 2019
    Date of Patent: March 12, 2024
    Assignee: Eisai R & D Management Co., Ltd.
    Inventors: Gregg F. Keaney, John Wang, Baudouin Gerard, Kenzo Arai, Xiang Liu, Guo Zhu Zheng, Kazunobu Kira, Lisa A. Marcaurelle, Marta Nevalainen, Ming-Hong Hao, Morgan Welzel O'Shea, Parcharee Tivitmahaisoon, Sudeep Prajapati, Tuoping Luo, Nicholas C. Gearhart, Jason T. Lowe, Yoshihiko Kotake, Satoshi Nagao, Regina Mikie Kanada Sonobe, Masayuki Miyano, Norio Murai, Andrew Cook, Shelby Ellery, Atsushi Endo, James Palacino, Dominic Reynolds
  • Publication number: 20220259082
    Abstract: The present disclosure relates to the field of chemical compounds, compositions and processes. More specifically, the present disclosure relates to compositions having a high-loading capacity in an aqueous medium and to compositions, processes and uses thereof as silica coagulants in hydrometallurgical process streams.
    Type: Application
    Filed: August 27, 2020
    Publication date: August 18, 2022
    Inventors: Ken DEUTSCHER, Sasha BOSKOVIC, Andrew COVENEY, Jason HONG, Salvatore LAZZARO, Kate TILDESLEY
  • Publication number: 20220210181
    Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.
    Type: Application
    Filed: March 14, 2022
    Publication date: June 30, 2022
    Inventors: Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Frederick Wescoe, Jason R. Brubaker, Jason Hong
  • Patent number: 11310261
    Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.
    Type: Grant
    Filed: June 24, 2020
    Date of Patent: April 19, 2022
    Assignee: Proofpoint, Inc.
    Inventors: Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20220013036
    Abstract: A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model. When the system determines that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario.
    Type: Application
    Filed: September 27, 2021
    Publication date: January 13, 2022
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Patent number: 11158207
    Abstract: A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model. When the system determines that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: October 26, 2021
    Assignee: Proofpoint, Inc.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20210021632
    Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.
    Type: Application
    Filed: June 24, 2020
    Publication date: January 21, 2021
    Inventors: Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Patent number: 10856577
    Abstract: A product use and behavior instrument includes a housing defining a central compartment therein. A controller is positioned within the central compartment. The controller includes a first connector. The first connector is configured to operatively and removably couple the product use and behavior instrument to a battery element. A second connector is configured to operatively and removably couple the product use and behavior instrument to a tank element. A sensor circuit is structured to collect at least one use data characteristic of a smoking action. The smoking action is associated with use of at least one of the tank and battery element. Local memory is structured to store the at least one use data characteristic of the smoking action. A communication interface is structured to communicate the stored at least one use data characteristic of the smoking action to a remote computing device.
    Type: Grant
    Filed: September 20, 2017
    Date of Patent: December 8, 2020
    Assignee: RAI STRATEGIC HOLDINGS, INC.
    Inventors: Jeffrey Sean Smith, Steven L. Alderman, Sarah A. Baxter-Wright, John Darnell, Kyung Soo (Jason) Hong, Paul R. Nelson, Elaine K. Round, Stephen B. Sears, Rajesh Sur
  • Patent number: 10810295
    Abstract: A system for automatic authentication of a user to allow access to websites and physical devices which provides tiered levels of security and defines an API protocol for exchange of authentication credentials.
    Type: Grant
    Filed: February 19, 2016
    Date of Patent: October 20, 2020
    Assignee: CARNEGIE MELLON UNIVERSITY
    Inventors: Eiji Hayashi, Jason Hong
  • Patent number: 10749887
    Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.
    Type: Grant
    Filed: April 20, 2017
    Date of Patent: August 18, 2020
    Assignee: Proofpoint, Inc.
    Inventors: Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20190087302
    Abstract: A product use and behavior instrument includes a housing defining a central compartment therein. A controller is positioned within the central compartment. The controller includes a connector. The connector is configured to operatively and removably couple the product use and behavior instrument to an electronic smoking article. The electronic smoking article includes a heating element to heat a tobacco product. The electronic smoking article includes a battery. A sensor circuit is structured to collect at least one use data characteristic of a smoking action. The smoking action is associated with use of at least one of the heating element and battery. Local memory is structured to store the at least one use data characteristic of the smoking action. A communication interface is structured to communicate the stored at least one use data characteristic of the smoking action to a remote computing device.
    Type: Application
    Filed: February 8, 2018
    Publication date: March 21, 2019
    Inventors: Jeffrey Sean Smith, Steven L. ALDERMAN, Paul A. BRINKLEY, Sarah A. BAXTER-WRIGHT, Kyung Soo (Jason) HONG, Paul R. NELSON, Stephen B. SEARS, Rajesh SUR
  • Publication number: 20190082737
    Abstract: A product use and behavior instrument includes a housing defining a central compartment therein. A controller is positioned within the central compartment. The controller includes a first connector. The first connector is configured to operatively and removably couple the product use and behavior instrument to a battery element. A second connector is configured to operatively and removably couple the product use and behavior instrument to a tank element. A sensor circuit is structured to collect at least one use data characteristic of a smoking action. The smoking action is associated with use of at least one of the tank and battery element. Local memory is structured to store the at least one use data characteristic of the smoking action. A communication interface is structured to communicate the stored at least one use data characteristic of the smoking action to a remote computing device.
    Type: Application
    Filed: September 20, 2017
    Publication date: March 21, 2019
    Inventors: Jeffrey Sean Smith, Steven L. Alderman, Sarah A. Baxter-Wright, John Darnell, Kyung Soo (Jason) Hong, Paul R. Nelson, Elaine K. Round, Stephen B. Sears, Rajesh Sur
  • Patent number: 9870715
    Abstract: A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model. When the system determines that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario.
    Type: Grant
    Filed: January 30, 2017
    Date of Patent: January 16, 2018
    Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20180004928
    Abstract: A system for automatic authentication of a user to allow access to websites and physical devices which provides tiered levels of security and defines an API protocol for exchange of authentication credentials.
    Type: Application
    Filed: February 19, 2016
    Publication date: January 4, 2018
    Applicant: CARNEGIE MELLON UNIVERSITY
    Inventors: Eiji Hayashi, Jason Hong
  • Patent number: 9824609
    Abstract: A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.
    Type: Grant
    Filed: December 23, 2016
    Date of Patent: November 21, 2017
    Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20170244746
    Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.
    Type: Application
    Filed: April 20, 2017
    Publication date: August 24, 2017
    Inventors: Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20170140663
    Abstract: A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model. When the system determines that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario.
    Type: Application
    Filed: January 30, 2017
    Publication date: May 18, 2017
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20170103674
    Abstract: A system assessing the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When the a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and us the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.
    Type: Application
    Filed: December 23, 2016
    Publication date: April 13, 2017
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Patent number: 9558677
    Abstract: A training system senses a user action that may expose the user to a threat, such as a cybersecurity threat. The user action may be in response to a mock attack delivered via a messaging service, a wireless communication service, a fake malware application or another device, service, system or mechanism. The system selects a training action from a collection of available training actions and causes the training action to be delivered to the user.
    Type: Grant
    Filed: March 17, 2014
    Date of Patent: January 31, 2017
    Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Patent number: 9547998
    Abstract: Context-aware training systems, apparatuses and systems. The context-aware training systems, apparatuses and systems are computer-implemented and include sensing a user action and, based on a training needs model, estimating a cost or benefit to exposing the user to a training action, selecting a training action from a collection of available training actions and delivering the training action to the user if the user action indicates a need for the user to be trained and the cost or benefit to exposing the user to the training action indicates user exposure to the training action is warranted.
    Type: Grant
    Filed: April 9, 2012
    Date of Patent: January 17, 2017
    Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong