Patents by Inventor Michael J. Chen
Michael J. Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11967937Abstract: A packaged semiconductor chip includes a semiconductor sub strate having formed thereon: radio-frequency (RF) input and output contact pads, DC contact pads, and first and second amplifier stages. An input of the first amplifier stage is coupled with the RF input contact pad. An input and an output of the second amplifier stage are respectively coupled to an output of the first amplifier stage and the RF output contact pad. The DC contact pads and the input of the first amplifier stages are connected via an input bias coupling path. The outputs of the amplifier stages are connected via an output bias coupling path. The chip further includes a lead frame having RF input and output pins electrically coupled to the RF input and output contact pads, and input bias pins electrically coupled to the DC contact pad.Type: GrantFiled: January 17, 2019Date of Patent: April 23, 2024Assignee: Viasat, Inc.Inventors: Shih Peng Sun, Kenneth V. Buer, Michael R. Lyons, Gary P. English, Qiang R. Chen, Ramanamurthy V. Darapu, Douglas J. Mathews, Mark S. Berkheimer, Brandon C. Drake
-
Publication number: 20240115577Abstract: The present disclosure relates to compounds. and to their pharmaceutical compositions. that inhibit dipeptidyl peptidase IV (DPP4). Hie compounds selectively promote the proliferation of alveolar type 2 cells (AEC2s) and are useful in therapeutic methods of treating diseases whose etiology. for example. derives from epithelial degeneration and maladaptive remodeling, such as pulmonary' diseases like idiopathic pulmonary fibrosis (IFF), acute respiratory' distress syndrome (ARDS), and infant respiratory' distress syndromes (IRDS).Type: ApplicationFiled: January 14, 2022Publication date: April 11, 2024Inventors: Michael J. Bollong, Peter G. Schultz, Sida Shao, Arnab Chatterjee, Jian Jeffrey Chen, Nan Zhang
-
Patent number: 11948226Abstract: A computer-implemented method for clinical workspace simulation includes capturing a real-world environment by an imaging device of an augmented reality headset and generating a composite view by rendering a first virtual object relative to a surgical table in the real-world environment. Captured real-world environment and the rendered first virtual object are combined in the composite view, which is displayed on a display of the augmented reality headset worn by a user.Type: GrantFiled: May 3, 2022Date of Patent: April 2, 2024Assignee: COVIDIEN LPInventors: Max L. Balter, Michael A. Eiden, William J. Peine, Unnas W. Hussain, Justin R. Chen
-
Patent number: 11700281Abstract: The present application is directed a computer-implemented technique for enhancing security and preventing cyber-attacks on a network. The technique includes receiving information from user equipment, selecting a first VPN server from a VPN service provider based upon a traffic-type of the user equipment, creating a policy to prevent cyber-attacks such that traffic associated with the received information of the user equipment is routed to the first VPN server, provisioning the first VPN server to last a predetermined amount of time based on the policy, coordinating the policy with a router on the network, with the traffic being sent to the VPN server via the router, and sending, after a predetermined condition is met, a request to the VPN service provider to transmit a second VPN server, and where the first VPN server terminates.Type: GrantFiled: September 29, 2020Date of Patent: July 11, 2023Inventor: Michael J. Chen
-
Patent number: 11606394Abstract: The present application is directed to a computer readable medium. The computer readable medium contains program instructions for managing traffic in a network that, when executed by a processor, causes the processor to determine, from among plural users, information of a user in the network. The program instructions also include reviewing selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network. The program instructions also include ranking efficiency of the plural, dynamic, virtual VPN cloud servers in the network. The program instructions further include controlling content displayed on a graphical user interface (GUI) including a dynamically changing list of users from the plural users matched with respective VPN cloud servers. The program instructions yet even further include matching the user with one of the plural, dynamic VPN cloud servers based on the ranked efficiency and the determined information of the user.Type: GrantFiled: February 23, 2021Date of Patent: March 14, 2023Assignee: CACI, Inc.—FederalInventor: Michael J. Chen
-
Publication number: 20220094718Abstract: The present application describes a method including a step of sending a request to a cloud provider to create a server on a cloud. The method also includes a step of receiving a notification from the cloud provider the server is available on the cloud. The method also includes a step of reviewing, via a graphical user interface (GUI), a continuously updated list of available servers provided by the cloud provider and another cloud provider. The method even also includes a step of reviewing, via the GUI, a continuously updated list of users in an enterprise to be matched with the available servers. The method further includes a step of determining, based on one of the users and the continuously updated list of available servers, one of the available servers to embed a virtual private network (VPN) service. The method even further includes a step of embedding the determined available server with the VPN service.Type: ApplicationFiled: December 7, 2021Publication date: March 24, 2022Inventor: Michael J. CHEN
-
Publication number: 20220078174Abstract: The present application describes, in an embodiment, a system which includes a non-transitory memory including executable instructions for obfuscating traffic. The system also includes a processor operably coupled to the non-transitory memory configured to execute a set of instructions. The set of instructions may include receiving, at a gateway, traffic from plural clients on a home network. The set of instructions may also include identifying a protocol type of the received traffic. The set of instructions may also include parsing the received traffic based on the protocol type. The set of instructions may also include creating an encrypted pathway to support flow of the received traffic associated with the protocol type to a destination. The set of instructions may also include transmitting, via the created encrypted pathway, the traffic associated with the protocol type to a destination.Type: ApplicationFiled: August 30, 2021Publication date: March 10, 2022Inventors: John A. BORAK, Eric W. HSIUNG, Michael J. CHEN
-
Publication number: 20220078171Abstract: The present application describes, in an embodiment, a method including one or more steps. One step of the method may include receiving, at a gateway including an encrypted pathway, traffic from a third party originating outside a multi-hop network intended for a client inside the network. Another step of the method may include determining, using a trained machine learning model, a probe of the received traffic attempting to obtain confidential information about the multi-hop network. Yet another step of the method may include flagging the third party based on determined probe.Type: ApplicationFiled: August 30, 2021Publication date: March 10, 2022Inventors: John A. BORAK, Eric W. HSIUNG, Michael J. CHEN
-
Patent number: 11233827Abstract: The present application is directed to a method for enhancing security. The method includes a step of sending a request to a cloud provider to create a server on a cloud. The method also includes a step of receiving a notification from the cloud provider that the requested server is available on the cloud. The method also includes a step of embedding the server with a VPN service. The method further includes a step of sending a credential of the server to an entity on the network. Yet further, the method includes a step of reviewing a list of servers created by the cloud provider. Yet even further, the method includes a step of evaluating progress of server generation by the cloud provider and one or more additional cloud providers. The application is also directed to system for enhancing security on a cloud server.Type: GrantFiled: October 3, 2019Date of Patent: January 25, 2022Assignee: CACI, INC.—FEDERALInventor: Michael J. Chen
-
Publication number: 20210218775Abstract: The present application is directed to a computer readable medium. The computer readable medium contains program instructions for managing traffic in a network that, when executed by a processor, causes the processor to determine, from among plural users, information of a user in the network. The program instructions also include reviewing selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network. The program instructions also include ranking efficiency of the plural, dynamic, virtual VPN cloud servers in the network. The program instructions further include controlling content displayed on a graphical user interface (GUI) including a dynamically changing list of users from the plural users matched with respective VPN cloud servers. The program instructions yet even further include matching the user with one of the plural, dynamic VPN cloud servers based on the ranked efficiency and the determined information of the user.Type: ApplicationFiled: February 23, 2021Publication date: July 15, 2021Inventor: Michael J. Chen
-
Patent number: 10965715Abstract: The present application is directed a computer-implemented method for for managing traffic in a network. The method includes a step of providing, at a computer including a graphical user interface (GUI), a request from a user to access the internet. The method also includes a step of determining information of the user including a security access in the network. The method further includes a step of reviewing, via the GUI, selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network. The method even further includes a step of ranking efficiency of the plural, dynamic, virtual VPN cloud servers in the network. The method yet even further includes a step of matching the user request with one of the plural, dynamic VPN cloud servers based on the ranked efficiency and the determined information. The active session of the one of the plural, dynamic VPN cloud servers lasts until a predetermined condition is met.Type: GrantFiled: August 27, 2019Date of Patent: March 30, 2021Assignee: CACI, Inc.—FederalInventor: Michael J. Chen
-
Publication number: 20210029172Abstract: The present application is directed a computer-implemented technique for enhancing security and preventing cyber-attacks on a network. The technique includes receiving information from user equipment, selecting a first VPN server from a VPN service provider based upon a traffic-type of the user equipment, creating a policy to prevent cyber-attacks such that traffic associated with the received information of the user equipment is routed to the first VPN server, provisioning the first VPN server to last a predetermined amount of time based on the policy, coordinating the policy with a router on the network, with the traffic being sent to the VPN server via the router, and sending, after a predetermined condition is met, a request to the VPN service provider to transmit a second VPN server, and where the first VPN server terminates.Type: ApplicationFiled: September 29, 2020Publication date: January 28, 2021Inventor: Michael J. Chen
-
Patent number: 10824802Abstract: Computer-based systems, software, and methods are provided for implementing a spreadsheet-based programming language adapted for report generation.Type: GrantFiled: December 27, 2012Date of Patent: November 3, 2020Assignee: BIBO LABS, INC.Inventor: Michael J. Chen
-
Patent number: 10798132Abstract: The present application is directed a computer-implemented method for enhancing security and preventing cyber-attacks on a network. The method includes a step of receiving, from a user equipment on the network, information including a source IP address and a destination IP address. The method also includes a step of selecting a first VPN server from a VPN service provider based upon a traffic-type of the user equipment. The method also includes a step of creating, via a graphical user interface, a policy to prevent cyber-attacks such that traffic associated with the information of the user equipment is routed to the first VPN server. The method further includes a step of sending the traffic of the user equipment to the VPN server. The method even further includes a step of provisioning the first VPN server to last a predetermined amount of time base on the created policy.Type: GrantFiled: April 16, 2019Date of Patent: October 6, 2020Inventor: Michael J. Chen
-
Publication number: 20200036756Abstract: The present application is directed to a method for enhancing security. The method includes a step of sending a request to a cloud provider to create a server on a cloud. The method also includes a step of receiving a notification from the cloud provider that the requested server is available on the cloud. The method also includes a step of embedding the server with a VPN service. The method further includes a step of sending a credential of the server to an entity on the network. Yet further, the method includes a step of reviewing a list of servers created by the cloud provider. Yet even further, the method includes a step of evaluating progress of server generation by the cloud provider and one or more additional cloud providers. The application is also directed to system for enhancing security on a cloud server.Type: ApplicationFiled: October 3, 2019Publication date: January 30, 2020Inventor: Michael J. Chen
-
Publication number: 20190387026Abstract: The present application is directed a computer-implemented method for for managing traffic in a network. The method includes a step of providing, at a computer including a graphical user interface (GUI), a request from a user to access the internet. The method also includes a step of determining information of the user including a security access in the network. The method further includes a step of reviewing, via the GUI, selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network. The method even further includes a step of ranking efficiency of the plural, dynamic, virtual VPN cloud servers in the network. The method yet even further includes a step of matching the user request with one of the plural, dynamic VPN cloud servers based on the ranked efficiency and the determined information. The active session of the one of the plural, dynamic VPN cloud servers lasts until a predetermined condition is met.Type: ApplicationFiled: August 27, 2019Publication date: December 19, 2019Inventor: Michael J. Chen
-
Patent number: 10484428Abstract: The present application is directed a computer-implemented method for enhancing security. The method includes a step of sending, from a VPN service provider, a request to a cloud provider to create a dynamic server on a cloud. Then, the VPN service provider receives a notification from the cloud provider that the requested server is available on the cloud. Subsequently, the VPN service provider embeds the dynamic server with a VPN service. Further, the VPN service provider sends a credential of the dynamic server to an entity on the network. The application is also directed to system for enhancing security on a cloud server.Type: GrantFiled: September 26, 2016Date of Patent: November 19, 2019Assignee: LGS Innovations LLCInventor: Michael J. Chen
-
Patent number: 10440058Abstract: The present application is directed a computer-implemented method for for managing traffic in a network. The method includes a step of receiving, from a user on the network, a request to access the internet. The method also includes a step of determining information of the user based upon the request. The information includes a security privilege of the user in the network. The method also includes a step of reviewing selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network. The method also includes a step of matching the determined information of the user with the selection criteria. Further, the method includes a step of sending traffic of the user to one of the plural, dynamic VPN cloud servers based upon the matching step. The application is also directed to a system for securing web traffic on a network including a policy controller and router.Type: GrantFiled: September 26, 2016Date of Patent: October 8, 2019Assignee: LGS Innovations LLCInventor: Michael J. Chen
-
Publication number: 20190245892Abstract: The present application is directed a computer-implemented method for enhancing security and preventing cyber-attacks on a network. The method includes a step of receiving, from a user equipment on the network, information including a source IP address and a destination IP address. The method also includes a step of selecting a first VPN server from a VPN service provider based upon a traffic-type of the user equipment. The method also includes a step of creating, via a graphical user interface, a policy to prevent cyber-attacks such that traffic associated with the information of the user equipment is routed to the first VPN server. The method further includes a step of sending the traffic of the user equipment to the VPN server. The method even further includes a step of provisioning the first VPN server to last a predetermined amount of time base on the created policy.Type: ApplicationFiled: April 16, 2019Publication date: August 8, 2019Inventor: Michael J. Chen
-
Patent number: D1019023Type: GrantFiled: March 30, 2020Date of Patent: March 19, 2024Assignee: Amazon Technologies, Inc.Inventors: Michael Edward James Paterson, Chia-Wei Chan, Mei Hsuan Chen, Benjamin Wild, Matthew J. England, Wen-Yo Lu, James Siminoff, Mark Siminoff, Yen-Chi Tsai