Patents by Inventor Joseph Chen

Joseph Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190380032
    Abstract: A system for a lattice mesh comprises an interface and a processor. The interface is configured to receive a request to register from a host, wherein the request to register includes a key and a set of asset IDs that the host wishes to claim. The processor is configured to sign the key to generate a resource authority (RA) certificate signed key with an RA certificate; update an asset database with the RA certificate signed key; distribute the RA certificate signed host public key through the network; and provide the host with the RA certificate signed key. In some embodiments, the system further comprises a memory that is coupled to the processor and configured to provide the processor with instructions.
    Type: Application
    Filed: November 27, 2018
    Publication date: December 12, 2019
    Inventors: Jared Newman, Ryan Brown, Brian W. Schimpf, Palmer F. Luckey, Julian Hammerstein, Travis M. Whitaker, Jason Levin, Joseph Chen
  • Patent number: 10506436
    Abstract: A system for a lattice mesh comprises an interface and a processor. The interface is configured to receive a request to register from a host, wherein the request to register includes a key and a set of asset IDs that the host wishes to claim. The processor is configured to sign the key to generate a resource authority (RA) certificate signed key with an RA certificate; update an asset database with the RA certificate signed key; distribute the RA certificate signed host public key through the network; and provide the host with the RA certificate signed key. In some embodiments, the system further comprises a memory that is coupled to the processor and configured to provide the processor with instructions.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: December 10, 2019
    Assignee: Anduril Industries Inc.
    Inventors: Jared Newman, Ryan Brown, Brian W. Schimpf, Palmer F. Luckey, Julian Hammerstein, Travis M. Whitaker, Jason Levin, Joseph Chen
  • Publication number: 20190372937
    Abstract: The disclosed computer-implemented method for split network tunneling based on traffic inspection may include a computing device directing network traffic to a network client of the computing device. The network client may perform an inspection of the network traffic. The network traffic may be categorized based on the inspection. In response to categorizing the network traffic, a security action may be performed to protect the computing device from computer malware. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: May 31, 2018
    Publication date: December 5, 2019
    Inventors: Qu Bo Song, Shaun Aimoto, Weiliang Li, Joseph Chen
  • Patent number: 10462050
    Abstract: The disclosed computer-implemented method for chaining virtual private networks may include (i) establishing a virtual private network client that routes network traffic to a virtual private network, (ii) establishing an additional virtual private network client that routes the network traffic to an additional virtual private network, (iii) configuring the virtual private network client for split routing such that the virtual private network client routes different ranges of incoming network traffic to respective different network addresses, (iv) configuring the additional virtual private network client to route all incoming network traffic according to a default route, and (v) chaining the virtual private network client and the additional virtual private network client such that they process incoming network traffic in series. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 29, 2018
    Date of Patent: October 29, 2019
    Assignee: Symantec Corporation
    Inventors: Qu Bo Song, Shaun Aimoto, Joseph Chen
  • Patent number: 10456638
    Abstract: A putter-type golf club head has a main body and a face component including a first element formed of a resilient material. The putter-type golf club head also has a second element forward of the first element and including a rigid material. The second element is secured directly to the first element. The first element has a thickness that gradually increases toward a sole portion of the club head.
    Type: Grant
    Filed: July 26, 2018
    Date of Patent: October 29, 2019
    Assignee: SUMITOMO RUBBER INDUSTRIES, LTD.
    Inventors: Keith Dolezel, Dan Nivanh, Mitch Samson, Joseph Chen, Mika Becktor, Michael Boyle, Dustin Brekke, Bryce Weir, Phillip C. Seagram
  • Patent number: 10367744
    Abstract: The disclosed computer-implemented method for network traffic routing to reduce service congestion at a server may include (1) receiving, by the computing device and from the cloud server, a traffic routing policy, (2) identifying, for a transaction and using at least one hook inserted into an operating system of the computing device, metadata describing a traffic type, (3) comparing the metadata with the traffic routing policy to determine the transaction is bypass traffic, and (4) sending the bypass traffic from the computing device to a destination other than the cloud server. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 25, 2017
    Date of Patent: July 30, 2019
    Assignee: Symantec Corporation
    Inventors: Qing Li, Mark Molnar, Joseph Chen, Ron Frederick
  • Patent number: 10366250
    Abstract: The disclosed computer-implemented method for protecting personally identifiable information during electronic data exchanges may include (i) receiving, from a computing device, an authentication token for a proposed electronic data exchange, (ii) preventing the user's personally identifiable information from entering the proposed electronic data exchange by identifying the user using the anonymized identifier rather than using the user's personally identifiable information, (iii) authenticating the user identified in the data exchange information, and (iv) in response to authenticating the user, authorizing completion of the proposed electronic data exchange. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: July 30, 2019
    Assignee: Symantec Corporation
    Inventors: Joseph Chen, Arvind Rao, Quentin Liu
  • Patent number: 10333949
    Abstract: The present disclosure relates to systems and methods for blocking an infection vector. In some embodiments, a method may include detecting, at a first device, a synchronization event with a second device, the first device and the second device operating with a proprietary mobile operating system. In some examples, the method may include recognizing, by the first device, that the first device is attempting to send a data package to the second device, and identifying the data package as malware. The method may further include blocking the data package from being received at the second device based at least in part on the identifying.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: June 25, 2019
    Assignee: Symantec Corporation
    Inventors: Rui Jing, Joseph Chen, Yuan Liu
  • Patent number: 10250980
    Abstract: A digital microphone is provided. The digital microphone includes an acoustic sensor, a bias generator, first and second attenuators, a buffer, an amplifier, an ADC, and a controller. The acoustic sensor transfers an acoustic signal to a voltage signal. The bias generator provides a bias voltage to the acoustic sensor. The first attenuator attenuates the voltage signal by a first attenuation value. The buffer buffers the voltage signal to generate a buffered voltage signal. The amplifier amplifies the buffered voltage signal to generate an amplified signal. The ADC converts the amplified signal to a data signal with a digital format. The second attenuator attenuates the data signal by a second attenuation value. The controller determines whether the amplified signal is larger than a reference value and adjusts the bias voltage and the first and second attenuation values of the first and second attenuators according to the result determined by the controller.
    Type: Grant
    Filed: October 11, 2017
    Date of Patent: April 2, 2019
    Assignee: FORTEMEDIA, INC.
    Inventors: Ion Opris, Abu Hena M Kamal, Lee Tay Chew, Ramesh Prakash, Shomo Chen, Qiang Wei, Lung-Chu Joseph Chen
  • Patent number: 10210330
    Abstract: The disclosed computer-implemented method for detecting malicious processes that encrypt files may include (i) identifying a backup file created by a backup process on the computing device, (ii) detecting an attempt to alter the backup file by a process that is not the backup process, (iii) determining, based at least in part on the attempt to alter the backup file being made by the process that is not the backup process, that the process is a malicious process designed to encrypt files on the computing device so that a legitimate owner of the files cannot access the files, and (iv) performing a security action in response to determining that the process is malicious. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 13, 2016
    Date of Patent: February 19, 2019
    Assignee: Symantec Corporation
    Inventor: Joseph Chen
  • Patent number: 10176329
    Abstract: The disclosed computer-implemented method for detecting unknown vulnerabilities in computing processes may include (1) monitoring a computing environment that facilitates execution of a computing process by logging telemetry data related to the computing process while the computing process is running within the computing environment, (2) determining that the computing process crashed while running within the computing environment, (3) searching the telemetry data for evidence of any vulnerabilities that potentially led the computing process to crash while running within the computing environment, (4) identifying, while searching the telemetry data, evidence of at least one vulnerability of the computing process that is not yet known to exist within the computing process and then in response to identifying the evidence of the computing process's vulnerability, (5) performing at least one security action to hinder any potentially malicious exploitation of the computing process's vulnerability.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: January 8, 2019
    Assignee: Symantec Corporation
    Inventors: Joseph Chen, Rei Kristian Resurreccion
  • Publication number: 20180333620
    Abstract: A putter-type golf club head has a main body and a face component including a first element formed of a resilient material. The putter-type golf club head also has a second element forward of the first element and including a rigid material. The second element is secured directly to the first element. The first element has a thickness that gradually increases toward a sole portion of the club head.
    Type: Application
    Filed: July 26, 2018
    Publication date: November 22, 2018
    Applicant: DUNLOP SPORTS CO. LTD.
    Inventors: Keith DOLEZEL, Dan NIVANH, Mitch SAMSON, Joseph CHEN, Mika BECKTOR, Michael BOYLE, Dustin BREKKE, Bryce WEIR, Phillip C. SEAGRAM
  • Patent number: 10114944
    Abstract: The disclosed computer-implemented method for classifying permissions on mobile devices may include (1) detecting that an application executing on a mobile device is issuing a request for one or more requested permissions to access one or more components of the mobile device, (2) determining an intended use of the application, (3) performing, through a security system distinct from the application and the operating system, an analysis of the request issued by the application at least in part by determining whether the intended use of the application corresponds to an expected use of the requested permission, and (4) providing, via a graphical user interface, a result of the analysis to an end user of the mobile device that indicates a security implication caused by granting the one or more requested permissions to the application. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 12, 2015
    Date of Patent: October 30, 2018
    Assignee: Symantec Corporation
    Inventors: Jinghao Li, Joseph Chen
  • Patent number: 10104472
    Abstract: An acoustic capture device includes an acoustic transducer, an acoustic detector, an analog-to-digital converter, and a processing element. The acoustic transducer captures an acoustic wave to generate an analog signal. The acoustic detector detects, according to the analog signal, a specific event to generate a trigger signal. The analog-to-digital converter converts the analog signal to generate a digital signal. The processing element receives the trigger signal to execute a control process. The control process includes: analyzing the digital signal to determine ambient information; determining a first set of parameters of the acoustic detector according to the ambient information; performing a control information protocol to adjust the acoustic detector according to the first set of parameters; and performing, according to the ambient information, an enhancement processing on the digital signal to generate an enhanced digital signal.
    Type: Grant
    Filed: January 30, 2017
    Date of Patent: October 16, 2018
    Assignee: FORTEMEDIA, INC.
    Inventors: Qiang Wei, Lung-Chu Joseph Chen, Powen Ru, Qing-Guang Liu, Yen-Son Paul Huang
  • Publication number: 20180278648
    Abstract: A computer-implemented method for enforcing dynamic network security policies may include (i) monitoring, by a network traffic protection system, network packets transmitted on a network segment, (ii) detecting, by the network traffic protection system, a suspicious transmission of at least one network packet associated with an endpoint computing device connected to the network segment, (iii) modifying, based on the suspicious transmission of the network packet, at least one network security policy for the network segment, and (iv) enforcing, by the network traffic protection system, the modified network security policy for all endpoint computing devices connected to the network segment. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: March 22, 2017
    Publication date: September 27, 2018
    Inventors: Qing Li, Joseph Chen, Torrey Umland, Min Hao Chen
  • Publication number: 20180255074
    Abstract: A method for managing cloud based applications is described. In one embodiment, the method includes detecting initiation of an application, detecting an action performed relative to the application, capturing the data associated with the detected action before the application encrypts the at least portion of the data, analyzing the captured data, and applying a network management policy to a packet flow based at least in part on the analyzing the captured data. In some cases, the application is configured to encrypt at least a portion of data associated with the detected action.
    Type: Application
    Filed: March 1, 2017
    Publication date: September 6, 2018
    Applicant: Symantec Corporation
    Inventors: Qing Li, Joseph Chen, Torrey Umland, Dave Stahl, Tigran Grigoryan, Min Hao Chen
  • Patent number: 10058748
    Abstract: A putter-type golf club head has a main body and a face component including a first element formed of a resilient material. The putter-type golf club head also has a second element forward of the first element and including a rigid material. The second element is secured directly to the first element. The first element has a thickness that gradually increases toward a sole portion of the club head.
    Type: Grant
    Filed: October 11, 2016
    Date of Patent: August 28, 2018
    Assignee: DUNLOP SPORTS CO. LTD.
    Inventors: Keith Dolezel, Dan Nivanh, Mitch Samson, Joseph Chen, Mika Becktor, Michael Boyle, Dustin Brekke, Bryce Weir, Phillip C. Seagram
  • Patent number: 10043013
    Abstract: The disclosed computer-implemented method for detecting gadgets on computing devices may include (i) identifying, on a computing device, a process containing multiple modules, (ii) identifying, within the process, each module that does not implement a security protocol that randomizes, each time the module executes, a memory location of at least one portion of data accessed by the module, (iii) copying each module that does not implement the security protocol to a section of memory dedicated to security analyses, (iv) determining, based on detecting at least one gadget-specific characteristic within at least one copied module, that the process contains a gadget that is capable of being maliciously exploited, and then (v) performing a security action on the computing device to prevent the gadget from being maliciously exploited. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: August 7, 2018
    Assignee: Symantec Corporation
    Inventors: Peter Ferrie, Joseph Chen
  • Publication number: 20180174972
    Abstract: Disclosed is a microelectronics package. The microelectronics package may include a reference plane, a signal routing layer, a dielectric layer, and a conductive layer. The signal routing layer may include a plurality of signal routing traces. The dielectric layer may be located adjacent to the signal routing layer. The conductive layer may be applied to the dielectric layer such that the dielectric layer is located in between the signal routing layer and the conductive layer. The conductive layer may be in electrical communication with the reference plane.
    Type: Application
    Filed: December 21, 2016
    Publication date: June 21, 2018
    Inventors: Li-Sheng Weng, Chung-Hao Joseph Chen, Emile Davies-Venn, Kemal Aygun, Mitul B. Modi
  • Publication number: 20180109875
    Abstract: A digital microphone is provided. The digital microphone includes an acoustic sensor, a bias generator, first and second attenuators, a buffer, an amplifier, an ADC, and a controller. The acoustic sensor transfers an acoustic signal to a voltage signal. The bias generator provides a bias voltage to the acoustic sensor. The first attenuator attenuates the voltage signal by a first attenuation value. The buffer buffers the voltage signal to generate a buffered voltage signal. The amplifier amplifies the buffered voltage signal to generate an amplified signal. The ADC converts the amplified signal to a data signal with a digital format. The second attenuator attenuates the data signal by a second attenuation value. The controller determines whether the amplified signal is larger than a reference value and adjusts the bias voltage and the first and second attenuation values of the first and second attenuators according to the result determined by the controller.
    Type: Application
    Filed: October 11, 2017
    Publication date: April 19, 2018
    Inventors: Ion OPRIS, Abu Hena M KAMAL, Lee Tay CHEW, Ramesh PRAKASH, Shomo CHEN, Qiang WEI, Lung-Chu Joseph CHEN