Patents by Inventor Kevin Jiang

Kevin Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250144374
    Abstract: Disclosed is an introducer for a medical device wherein the introducer is configured to be substantially sterilized throughout entire d1 and d2 along substantially entire I1 and the introducer includes a first and a second polymer layer that are coextruded.
    Type: Application
    Filed: January 9, 2025
    Publication date: May 8, 2025
    Inventors: Sean Chow, Jeong Soo Lee, Kevin Jiang
  • Publication number: 20250138863
    Abstract: A method for monitoring a file system within a distributed network is provided. From a local hosting environment having a native scanning tool, creation of a new data store within the network is detected. Responsive to detecting creation of the new data store, it is determined whether the new data store is physically located within a foreign hosting environment that is communicatively coupled to the local hosting environment through a non-private network. If the new data store is physically located within the foreign hosting environment, an agent of the native scanning tool is created within the foreign hosting environment and the agent is applied to the new data store within the foreign hosting environment to obtain sensitivity information for the new data store. The sensitivity information for the new data store is received and recorded in the local hosting environment.
    Type: Application
    Filed: October 29, 2024
    Publication date: May 1, 2025
    Inventors: Duy Quoc VU, Danny HUI, Kevin JIANG, Vinh TRAN, Mohit ARORA
  • Publication number: 20250009507
    Abstract: Devices and methods for providing a reservoir of fluid within a handle of a guide catheter are disclosed. As one example, a delivery apparatus can include a handle including a proximal segment including one or more fluid seals mounted within the proximal segment, an intermediate segment disposed adjacent and distal to the proximal segment, the intermediate segment including an inner surface defining a first lumen having a first inner diameter, and a distal segment disposed adjacent and distal to the intermediate segment. The delivery apparatus can further include a shaft extending distally from the handle, the shaft including a second lumen extending between a distal end and a proximal end of the shaft, the second lumen including a second inner diameter that is smaller than the first inner diameter of the first lumen.
    Type: Application
    Filed: September 13, 2024
    Publication date: January 9, 2025
    Inventors: Kevin Jiang, Darshin S. Patel, Kurt Kelly Reed
  • Publication number: 20240390140
    Abstract: Devices and methods for providing fluid to a lumen of a guide catheter with a fluid reservoir fluidly coupled to the lumen, such that pressure within the lumen is maintained at a desired level, are disclosed. As one example, a delivery apparatus can include a handle, a shaft extending within and distally from the handle and having a main lumen, and a reservoir fluidly coupled to the main lumen. The reservoir is filled with fluid and has an adjustable fluid volume, and the reservoir is configured to passively supply fluid to the main lumen based on a fluid pressure in the main lumen.
    Type: Application
    Filed: August 8, 2024
    Publication date: November 28, 2024
    Inventors: Kurt Kelly Reed, Kevin Jiang, Alyssa Joy Hamm (formerly Gross)
  • Publication number: 20240246105
    Abstract: A coating device includes at least one applicator configured to coat a glue onto two opposite sides of an electrode sheet; at least one roller assembly configured to guide the electrode sheet past the at least one applicator; and at least one support bar arranged under the at least one applicator.
    Type: Application
    Filed: January 18, 2024
    Publication date: July 25, 2024
    Applicant: Nordson Corporation
    Inventors: Peter QIU, Neil REN, Kevin JIANG, Andrew HU, Lock CHEN, Mikky SHAO, Charles YI
  • Patent number: 11564301
    Abstract: Methods, systems, and computer program products for automated scotopic adaptation are provided herein. A computer-implemented method includes measuring ambient illumination levels associated with at least one user over a first period of time; measuring illumination intensity levels generated by one or more illumination source devices during at least a portion of the first period of time; generating a scotopic adaptation model associated with the at least one user by processing at least a portion of the measured ambient illumination levels in conjunction with processing at least a portion of the measured illumination intensity levels; and automatically adjusting one or more illumination intensity levels generated by at least a portion of the one or more illumination source devices based at least in part on the scotopic adaptation model and one or more ambient illumination levels associated with the at least one user detected over a second period of time.
    Type: Grant
    Filed: December 29, 2021
    Date of Patent: January 24, 2023
    Assignee: Good Interfaces, Inc.
    Inventors: Justin Lange, Kevin Jiang
  • Publication number: 20220278450
    Abstract: A method for designing a phased-array antenna embedded into stacked high impedance surfaces (HIS) structure is proposed. The stacked HIS structure comprises a plurality of HIS cell, which has two plate layers with adjustable height of the lower layer. Each HIS cell has a corresponding LC tank structure. Under a given height (HIS cell volume), the overall capacitance increases when the height of the lower layer plate increases. By adjusting the height of the lower layer plate, a variable capacitance of the corresponding LC tank can be achieved to allow lower operation frequencies of the phased-array antenna and to realize the benefit of HIS in band of interest. In addition, different design conditions can be achieved for the phased-array antenna.
    Type: Application
    Filed: February 28, 2022
    Publication date: September 1, 2022
    Inventor: Kevin Jiang
  • Publication number: 20220217826
    Abstract: Methods, systems, and computer program products for automated scotopic adaptation are provided herein. A computer-implemented method includes measuring ambient illumination levels associated with at least one user over a first period of time; measuring illumination intensity levels generated by one or more illumination source devices during at least a portion of the first period of time; generating a scotopic adaptation model associated with the at least one user by processing at least a portion of the measured ambient illumination levels in conjunction with processing at least a portion of the measured illumination intensity levels; and automatically adjusting one or more illumination intensity levels generated by at least a portion of the one or more illumination source devices based at least in part on the scotopic adaptation model and one or more ambient illumination levels associated with the at least one user detected over a second period of time.
    Type: Application
    Filed: December 29, 2021
    Publication date: July 7, 2022
    Inventors: Justin Lange, Kevin Jiang
  • Patent number: 10616214
    Abstract: The disclosed computer-implemented method for preventing loss of possession factors may include (i) identifying an account of a user that is associated with a possession factor that is used by the user to perform a multi-factor authentication procedure that is required when accessing the account of the user, (ii) monitoring one or more attributes of at least one of the user and the possession factor, (iii) determining, based at least in part on the one or more attributes of at least one of the user and the possession factor, that the possession factor has likely been lost, and (iv) performing a security action in response to determining that the possession factor has likely been lost to prevent the user from being unable to perform the multi-factor authentication procedure. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 9, 2016
    Date of Patent: April 7, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Kevin Jiang, Ilya Sokolov
  • Patent number: 10523715
    Abstract: A NAT system is identified as operating in conjunction with a specific IP address, in response to a threshold number of different authenticated computing devices making requests to the web service from the specific IP address during a given time period. The total number of computing devices operating from behind the identified NAT system is estimated, based on how many separate authenticated computing devices make requests to the web service from the IP address during the period of time. When a NAT system is identified, one or more additional action(s) are taken to manage the processing of traffic originating from the specific IP address, taking into account that multiple computing devices are operating behind the identified NAT system. An example action is rate limiting.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: December 31, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov, Rickey Ray
  • Patent number: 10482223
    Abstract: The disclosed computer-implemented method for selecting questions for knowledge-based authentication based on social entropy may include (1) identifying a potential question to ask a user of a computing system during a KBA process in an attempt to verify the user's identity, (2) determining whether any information suggestive of a correct answer to the potential question is available to anyone other than the user of the computing system, (3) calculating a social entropy of the potential question based at least in part on the determination of whether any information suggestive of the correct answer is available to anyone other than the user, and then (4) selecting the potential question to be asked to the user during the KBA process based at least in part on the social entropy of the potential question. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 18, 2016
    Date of Patent: November 19, 2019
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Kevin Jiang, Bruce McCorkendale
  • Patent number: 10447736
    Abstract: A computer-implemented method for providing security in smart buildings may include (1) detecting the presence of a user in a smart building, (2) determining that the user is unauthorized to access at least one resource in a smart building network within the smart building, (3) in response to determining that the user is unauthorized to access the resource in the smart building network, selecting an authentication policy that provides heightened security within the smart building network, and (4) increasing security within the smart building network to reflect the presence of the user by implementing the authentication policy within the smart building network. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: October 15, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov, Lei Gu, Michael Shavell
  • Patent number: 10404697
    Abstract: The disclosed computer-implemented method for using vehicles as information sources for knowledge-based authentication may include (1) identifying a vehicle belonging to a user who is attempting to authenticate with an identity-verification authority, (2) acquiring analytic information about the vehicle, (3) generating, by analyzing the analytic information about the vehicle, at least one authentication question, where the correct response to the authentication question requires knowledge about the vehicle, (4) presenting the authentication question to the user, and (5) authenticating the identity of the user based on the user responding correctly to the authentication question. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: September 3, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov, Bruce McCorkendale
  • Patent number: 10348755
    Abstract: The disclosed computer-implemented method for detecting network security deficiencies on endpoint devices may include (i) detecting, at a network device, a request from an endpoint device to automatically connect to a wireless network, (ii) establishing, via the network device, a network connection between the endpoint device and a wireless network that appears to be the wireless network requested by the endpoint device but is not actually the requested wireless network, (iii) determining, based on establishing the network connection between the endpoint device and the wireless network that appears to be the requested wireless network, that the endpoint device is vulnerable to network attacks, and then (iv) facilitating, via the network connection, a security action on the endpoint device to protect the endpoint device against the network attacks. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: July 9, 2019
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Kevin Jiang, Jose Reyes
  • Patent number: 10331879
    Abstract: A computer-implemented method for automatically generating passwords that comply with password restrictions may include (1) maintaining a database that stores password criteria for a plurality of websites, (2) determining that a user is accessing a website that requests creation of a password, (3) determining a set of password complexity rules for the website by querying the database that stores the password criteria, (4) using the set of password complexity rules to automatically generate the password for the website such that the password complies with the password criteria for the website, and (5) providing the password for use in the website that requested creation of the password. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 14, 2015
    Date of Patent: June 25, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov
  • Patent number: 10292047
    Abstract: A computer-implemented method for preventing tracking of mobile devices may include (1) identifying, from a first device with wireless networking capability, an initial service set identifier used by the first device as identification for a wireless network, where a second device with wireless networking capability also uses the initial service set identifier, (2) determining, based at least in part on a time indicator at the first device, that the initial service set identifier is to be changed, (3) generating a new service set identifier for use by the first device instead of the initial service set identifier, where the new service set identifier is generated with an identifier generation algorithm that is also used by the second device, and (4) replacing use of the initial service set identifier by the first device with use of the new service set identifier. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 23, 2015
    Date of Patent: May 14, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Michael Shavell, Matt Boucher
  • Patent number: 10289865
    Abstract: A computer-implemented method for providing kinship-based accessibility to securely stored data may include (1) identifying encrypted data that is encrypted with a first cryptographic key which was derived from heritable biometric information obtained from a first person, (2) receiving heritable biometric information obtained from a second person related to the first person within a predetermined degree, (3) generating a second cryptographic key based at least in part on the heritable biometric information obtained from the second person, and (4) decrypting the encrypted data that is encrypted with the first cryptographic key derived from the heritable biometric information obtained from the first person by using the second cryptographic key generated based at least in part on the heritable biometric information obtained from the second person. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: May 14, 2019
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Kevin Jiang
  • Patent number: 10284556
    Abstract: A computer-implemented method for verifying authentication requests using IP addresses may include (i) collecting, by a computing system, data on IP address changes from a set of endpoint devices, (ii) creating, by the computing system using the data on IP address changes, a virtual IP address distance map based on a likelihood of change from at least one origin IP address to at least one destination IP address, (iii) automatically detecting, by the computing system, a change in an IP address of a client device, (iv) determining, by the computing system and based on the virtual IP address distance map, that the change in the IP address of the client device indicates that an authentication request from the client device is suspicious, and (v) performing, by the computing system, a security action to secure the client device. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 11, 2016
    Date of Patent: May 7, 2019
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Kevin Jiang
  • Patent number: 10257202
    Abstract: The disclosed computer-implemented method for logging users out of online accounts may include (i) receiving, from a first computing device of a user, a request from the user to log into an online account hosted by an online platform, (ii) establishing, between the online platform and a second computing device of the user, a network session that both (a) verifies the identity of the user to the online platform and (b) at least partially disrupts the functionality of the second computing device, (iii) logging the user into the online account via the first computing device, (iv) detecting a request from the user to log out of the online account, and then (v) in response to the request to log out of the online account, (a) restoring full functionality of the second computing device by terminating the network session and (b) logging the user out of the online account.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: April 9, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov, Rickey Ray
  • Patent number: 10248769
    Abstract: The disclosed computer-implemented method for authenticating users on touchscreen devices may include (i) detecting that the computing device is at an authentication step that requires valid authentication input from a user in order to authenticate the user to a service on the computing device, (ii) detecting that the computing device is physically oriented such that a touchscreen of the computing device is facing away from the user of the computing device, (iii) receiving input from the user via the touchscreen, (iv) determining that the input from the user comprises a mirrored version of the valid authentication input that is flipped along a vertical axis relative to the touchscreen, and (v) authenticating the user to the service in response to determining that the input comprises the mirrored version of the valid authentication input. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: August 10, 2016
    Date of Patent: April 2, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov