Patents by Inventor Lei Gu

Lei Gu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10206110
    Abstract: Techniques are described for network security. One method includes identifying a network-access boundary associated with a network for a location, generating a credential for the network based at least in part on the identified network-access boundary, receiving a request from a user equipment (UE) to access the network associated with the location, and transmitting the credential associated with the network based at least in part on the network-access boundary.
    Type: Grant
    Filed: July 15, 2016
    Date of Patent: February 12, 2019
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Lei Gu, Ilya Sokolov, Kevin Jiang
  • Patent number: 10204499
    Abstract: A system and method for efficiently establishing patterns of behavior for location-aware monitoring applications. An administrator registers a trackable entity with a tracking service by providing identification of at least the trackable entity, a point of origin and a destination. To identify and select paths between the point of origin and the destination, the tracking service accesses crowdsourced information corresponding to the history of movements of trackable entities between the point of origin and the destination. The tracking service identifies intermediate locales along the selected paths and determines an expected duration of stay for each of the intermediate locales based on the history of movements.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: February 12, 2019
    Assignee: Symantec Corporation
    Inventors: Keith Newstadt, Lei Gu
  • Patent number: 10107315
    Abstract: A pressure sensor system may sense the pressure of a gas or liquid. The system may include a housing that has an entry port for the gas or liquid; a pressure sensor within the housing; and a baffle positioned between the entry port and the pressure sensor. The baffle may have one or more inlets oriented to receive gas or liquid that enters the entry port; one or more outlets oriented to deliver the received gas or liquid to the pressure sensor; and one or more sealed flow channels that prevent the gas or liquid from escaping from the baffle, other than through the one or more outlets. At least one of the outlets may be located within no more than one millimeter of a location on the pressure sensor. The pressure sensor and baffle may be made at the same time during a process of depositing, pattering, etching, wafer bonding, and/or wafer thinning a series of layers using microelectromechanical systems (MEMS) technology.
    Type: Grant
    Filed: December 9, 2013
    Date of Patent: October 23, 2018
    Assignee: MKS Instruments, Inc.
    Inventors: Lei Gu, Stephen F. Bart
  • Patent number: 10097560
    Abstract: The disclosed computer-implemented method for automatically adjusting user access permissions based on beacon proximity may include (1) identifying a network-enabled device that is attempting to access a network resource that is protected by a security policy, where the security policy identifies an access level at which one or more devices may access the network resource when the devices are within range of the short-range wireless signal from the secure beacon, (2) determining that the network-enabled device is within range of the short-range wireless signal from the secure beacon, and (3) establishing, according to the security policy, the access level at which the network-enabled device is allowed to access the network resource based at least in part on the network-enabled device being within range of the short-range wireless signal. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: October 9, 2018
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Kevin Jiang, Ilya Sokolov, Lei Gu
  • Publication number: 20180269749
    Abstract: An electrical machine includes an electric motor, a cooling jacket over the electric motor, and a power inverter having multiple AC power outlets. The electrical machine also includes an elongated busbar having an end adjacent to and coupled to an AC power outlet. The other end of the elongated busbar is adjacent to and coupled to the electric motor. The elongated busbar traverses from one end of the electric motor to a second end of the electric motor over, and in thermal contact with, the cooling jacket so as to reduce a high temperature at the electric motor to a low temperature at the AC power outlet.
    Type: Application
    Filed: March 15, 2017
    Publication date: September 20, 2018
    Inventors: Lei Gu, Zhong Nie, Yu Liu, Xiaogang Wang
  • Publication number: 20180270994
    Abstract: A power inverter with liquid cooled busbars includes multiple AC power outlets. The power inverter also includes a busbar having a busbar arm connected to one of the AC power outlets, and a busbar leg having a first end connected to the busbar arm. The busbar leg is at least partially situated in a cooling channel of the power inverter, which may be a built-in cooling channel or a detachable cooling channel. A second end of the busbar leg extends beyond the cooling channel and is exposed for electrical connection.
    Type: Application
    Filed: March 15, 2017
    Publication date: September 20, 2018
    Inventors: Xiaogang Wang, Zhong Nie, Yu Liu, Lei Gu
  • Patent number: 10078762
    Abstract: The disclosed computer-implemented method for digitally enforcing computer parental controls may include (i) identifying a parental-control policy that controls a user's computer usage in some way, (ii) determining that the user is using a primary device, which is configured to restrict its usage according to the terms of the parental-control policy, to access a secondary device, which is not configured to restrict its usage according to the terms of the parental-control policy, and (iii) restricting, in response to the determination, the user's access to the secondary device according to the terms of the parental-control policy. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: September 18, 2018
    Assignee: Symantec Corporation
    Inventors: Lei Gu, Keith Newstadt
  • Patent number: 10061916
    Abstract: The disclosed computer-implemented method for measuring peer influence on a child may include (i) monitoring computing activity on at least one endpoint device of a child to identify (a) baseline behaviors that indicate expected behavior patterns of the child (b) an unusual behavior of the child that indicates a deviation from the baseline behaviors, (ii) identifying, based at least in part on the monitored computing activity, a peer of the child associated with the unusual behavior, (iii) determining, based at least in part on a comparison between the baseline behaviors and the unusual behavior, a level of influence the peer has on the child, and then (iv) performing a computing security action that prevents the child from engaging in potentially harmful behaviors by providing, to a guardian of the child, the level of influence of the peer. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 9, 2016
    Date of Patent: August 28, 2018
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Keith Newstadt, Lei Gu
  • Patent number: 10032033
    Abstract: The disclosed computer-implemented method for protecting backed-up data from ransomware attacks may include (1) determining that a backup system periodically backs up at least one file stored at a computing device to a remote storage system by storing a copy of the file at the remote storage system, (2) identifying one or more characteristics of the file backed up by the backup system, (3) storing a tripwire file with the one or more characteristics at the computing device, (4) determining that the file stored at the computing device has likely been encrypted by ransomware executing on the computing device by detecting that the tripwire file has been modified, (5) performing an action that prevents the backup system from replacing the copy of the file at the remote storage system with a copy of the encrypted file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 12, 2015
    Date of Patent: July 24, 2018
    Assignee: Symantec Corporation
    Inventors: Lei Gu, Matt Boucher
  • Publication number: 20180176863
    Abstract: The embodiments of the present disclosure relates to the communications field, and discloses a capability indication method, a route setup method, a mobile terminal, and a network device, so as to save electricity of a mobile terminal in a D2D mesh network. A specific solution is as follows: A network device sends first indication information to a mobile terminal, where the first indication information is used to indicate that a communications network in which the network device is located supports communication between mobile terminals having a multi-hop capability, and the mobile terminal having the multi-hop capability is a mobile terminal having a capability of directly communicating with one or more mobile terminals. Embodiments of the present disclosure are applied to D2D communication.
    Type: Application
    Filed: February 15, 2018
    Publication date: June 21, 2018
    Inventors: Yongzhao Cao, Fangfu Guo, Lei Gu, Chi Zhang
  • Patent number: 10000568
    Abstract: The invention discloses binding agents to the E746-A750 deletion and the L858R point mutations in the epidermal growth factor receptor (EGFR) molecule, and methods for use thereof, including methods for the diagnosis and treatment of cancer.
    Type: Grant
    Filed: April 10, 2009
    Date of Patent: June 19, 2018
    Assignee: Cell Signaling Technology, Inc.
    Inventors: Ting-Lei Gu, Jiong Wu, Susan Kane, Jian Yu, Herbert Haack, James Wieler, Jun-Ming Cai, Victoria Rimkunas
  • Publication number: 20180156802
    Abstract: Novel gene deletions and translocations involving chromosome 2 resulting in fusion proteins combining part of Anaplastic Lymphoma Kinase (ALK) kinase with part of a secondary protein have now been identified in human solid tumors, e.g. non-small cell lung carcinoma (NSCLC). Secondary proteins include Echinoderm Microtubule-Associated Protein-Like 4 (EML-4) and TRK-Fusion Gene (TFG). The EML4-ALK fusion protein, which retains ALK tyrosine kinase activity, was confirmed to drive the proliferation and survival of NSCLC characterized by this mutation. The invention therefore provides, in part, isolated polynucleotides and vectors encoding the disclosed mutant polypeptides, probes for detecting it, isolated mutant polypeptides, and reagents for detecting the fusion and truncated polypeptides.
    Type: Application
    Filed: July 5, 2017
    Publication date: June 7, 2018
    Applicant: CELL SIGNALING TECHNOLOGY, INC.
    Inventors: Klarisa Rikova, Herbert Haack, Laura Sullivan, Ailan Guo, Anthony Possemato, Joan MacNeill, Ting-Lei Gu, Jian Yu
  • Patent number: 9988688
    Abstract: Novel gene deletions and translocations involving chromosome 2 resulting in fusion proteins combining part of Anaplastic Lymphoma Kinase (ALK) kinase with part of a secondary protein have been identified herein in human solid tumors, e.g. non-small cell lung carcinoma (NSCLC). Secondary proteins include Echinoderm Microtubule-Associated Protein-Like 4 (EML-4) and TRK-Fusion Gene (TFG). The EML4-ALK fusion protein, which retains ALK tyrosine kinase activity, was confirmed to drive the proliferation and survival of NSCLC characterized by this mutation. The invention therefore provides, in part, isolated polynucleotides and vectors encoding the disclosed mutant ALK kinase polypeptides, probes for detecting it, isolated mutant polypeptides, recombinant polypeptides, and reagents for detecting the fusion and truncated polypeptides.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: June 5, 2018
    Assignee: Cell Signaling Technology, Inc.
    Inventors: Klarisa Rikova, Herbert Haack, Laura Sullivan, Ailan Guo, Anthony Possemato, Joan MacNeill, Ting-Lei Gu, Jian Yu
  • Publication number: 20180087491
    Abstract: Microelectromechanical systems (MEMS) devices are described that include a proof mass movably connected to a substrate by accordion springs disposed on opposite sides of the proof mass, with a coupler coupling two of the accordion springs together. The coupler is a bar in some implementations, and may be rigid. The coupler therefore restricts the motion of the accordion springs relative to each other. In this manner, the motion of the proof mass may be restricted to preferred types and frequencies.
    Type: Application
    Filed: September 27, 2016
    Publication date: March 29, 2018
    Applicant: Analog Devices, Inc.
    Inventors: Qian Zhang, Kuang L. Yang, Lei Gu
  • Patent number: 9882889
    Abstract: Techniques for user authentication are disclosed. In one embodiment, the techniques may be realized as a method including during registration of a user, receiving a first captured image of a physical key having a blade; identifying from the captured image a plurality of features associated with the blade of the physical key; associating the identified plurality of features with the user as key feature data; in response to a subsequent access request by the user requiring authorization of the user, prompting the user to present the physical key; receiving a second captured image in response to prompting the user; analyzing the second image to determine if the key feature data is represented in the second image; and in response to determining that the key feature data is represented in the second image, authorizing the user's access request.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: January 30, 2018
    Assignee: Symantec Corporation
    Inventors: Lei Gu, Ilya Sokolov, Matt Boucher
  • Patent number: 9883339
    Abstract: A system and method for establishing patterns of social behavior for users of mobile devices. An administrator registers a person of interest with a service by identifying a mobile device used by the person of interest and generates one or more rules. The registered mobile device monitors network traffic of other surrounding mobile devices and sends their unique identifiers to the service. The service accesses one or more registries to identify users associated with the other surrounding mobile devices. The service determines whether any rule infractions occur based on one or more of the identified users, distances between the registered mobile device and other surrounding devices, frequencies of occurrences of mobile devices being relatively near and detected time periods. If any rule infractions occur, then the service generates an alert and sends it to the administrator.
    Type: Grant
    Filed: September 29, 2016
    Date of Patent: January 30, 2018
    Assignee: Symantec Corporation
    Inventors: Lei Gu, Kevin B. Jiang, Keith Newstadt
  • Patent number: 9850123
    Abstract: Stress relief structures and methods that can be applied to MEMS sensors requiring a hermetic seal and that can be simply manufactured are disclosed. The system includes a sensor having a first surface and a second surface, the second surface being disposed away from the first surface, the second surface also being disposed away from a package surface and located between the first surface and the package surface, a number of support members, each support member extending from the second surface to the package surface, the support members being disposed on and operatively connected to only a portion of the second surface. The support member are configured to reduce stress produced by package-sensor interaction.
    Type: Grant
    Filed: October 19, 2016
    Date of Patent: December 26, 2017
    Assignee: MKS Instruments, Inc.
    Inventors: Lei Gu, Stephen F. Bart
  • Patent number: 9794744
    Abstract: A system and method for efficiently establishing secure mobile device communication for location-aware applications. A beacon device broadcasts encrypted packets. Each of the packets includes an indication of a respective time of broadcast. A mobile computing device, such as a smartphone, receives a packet that is broadcast from the beacon device. The mobile computing device determines the packet corresponds to a particular location-aware application and sends the packet to a server. The server determines an expected latency for the received packet based at least in part on crowdsourcing, which includes latencies of other packets sent from the same location. If the server determines the latency of the received packet is not within an expected range, the server considers the packet to be invalid.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: October 17, 2017
    Assignee: Symantec Corporation
    Inventors: Lei Gu, Ilya Sokolov
  • Patent number: 9788160
    Abstract: Dynamic location tracking may be performed by a mobile app executing on a mobile computing device. A first geo-fence of a predefined size is set on a mobile operating system of a mobile computing device to notify a mobile app when the first geo-fence is crossed by the mobile computing device. The notification occurs even when the mobile app is suspended or not running. Notification is received from the mobile operating system that the mobile computing device has crossed the first geo-fence. A location of the mobile computing device is received. A second geo-fence is set on a mobile operating system of the mobile computing device based on the location of the mobile computing device.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: October 10, 2017
    Assignee: Symantec Corporation
    Inventors: Lei Gu, Abhilash Raipally, Dinesh Ramaswamy Ganesh, Andrew Davis Emerson, Anand Elumalai
  • Publication number: 20170270293
    Abstract: A computer-implemented method for generating tripwire files may include (1) generating an initial tripwire file according to an initial tripwire generation calculation, the initial tripwire file configured such that modification of the initial tripwire file triggers investigation of a security breach, (2) generating a subsequent tripwire file according to a subsequent tripwire generation calculation, the subsequent tripwire generation calculation differing from the initial tripwire generation calculation along at least one dimension, (3) receiving automated feedback that indicates whether at least one of the initial tripwire file and the subsequent tripwire file failed to enable detection of a security threat, and (4) adjusting automatic generation of a third tripwire file based on the automated feedback indicating whether at least one of the initial tripwire file and the subsequent tripwire file failed to detect the security threat.
    Type: Application
    Filed: March 15, 2016
    Publication date: September 21, 2017
    Inventors: Lei Gu, IIya Sokolov, Matt Boucher