Patents by Inventor Paul Fan
Paul Fan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12234991Abstract: A solid pellet fueled apparatus having a duel auger system and multi/high speed auger motor is disclosed. The duel auger may include first and second auger blades mounted on a single auger shaft having blade pitches configured to convey solid fuel in opposite directions towards a central burn pot. Each auger blade may service a separate solid fuel compartment provided in a single hopper. The auger motor may have a high-speed setting that may be selected for solid fuel clean out.Type: GrantFiled: July 17, 2023Date of Patent: February 25, 2025Assignee: WH PRODUCTS, LLCInventors: Paul J. Simon, Michael R. Giebel, Xianjia Fan
-
Patent number: 12201503Abstract: A nonwoven web for an absorbent article is provided. The absorbent article comprises the nonwoven web as a core wrap. A method for producing the absorbent article is also provided. The nonwoven web comprises a first nonwoven layer comprising filament fibers, a second nonwoven layer comprising filaments fibers, a third nonwoven layer comprising staple fibers disposed between the first and second nonwoven layers. A total basis weight of the first and second nonwoven layers is not less than about 10 gsm. The third nonwoven layer has a basis weight no greater than about 4 gsm. The nonwoven web comprises pores, wherein greater than about 80% of the pores have a pore size equal to or smaller than about 40 ?m, and wherein less than about 10% of the pores have a pore size equal to or greater than about 45 ?m.Type: GrantFiled: November 1, 2019Date of Patent: January 21, 2025Assignee: The Procter & Gamble CompanyInventors: Yi Yuan, Paul Thomas Pineda Contreras, Yufei Shan, Gueltekin Erdem, Yibo Fan, Ekaterina Ponomarenko
-
Patent number: 9916447Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: GrantFiled: September 22, 2015Date of Patent: March 13, 2018Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE (BEIJING) COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
-
Patent number: 9444834Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.Type: GrantFiled: February 4, 2013Date of Patent: September 13, 2016Assignee: Beijing Qihoo Technology Company LimitedInventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
-
Publication number: 20160012224Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: ApplicationFiled: September 22, 2015Publication date: January 14, 2016Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Hongyi ZHOU, Wenbin ZHENG, He YU, Paul FAN
-
Patent number: 9177141Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: GrantFiled: August 8, 2011Date of Patent: November 3, 2015Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE(BEIJING) COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
-
Publication number: 20150207810Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.Type: ApplicationFiled: February 4, 2013Publication date: July 23, 2015Inventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
-
Publication number: 20130174257Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: ApplicationFiled: August 8, 2011Publication date: July 4, 2013Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
-
Patent number: 7784098Abstract: A computer system operation registers as an event when an operation potentially characteristic of malware occurs. Events are scored and when a threshold is reached indicative of a possible malware infection a restore point is created. Many restore points are created. When a user decides to restore the system because of the presence of malware a malware report is retrieved. The malware report describes characteristics of a particular piece of malware. The malware report is compared to the restore point logs that had been created earlier. Any number of malware reports are compared to the restore point logs. A restore point log that shares many of the same system changes or other effects also present in a malware report is likely to be an indication of the beginning of a malware infection. The matched restore point log is recommended to the user as the best restore point.Type: GrantFiled: July 14, 2005Date of Patent: August 24, 2010Assignee: Trend Micro, Inc.Inventors: Paul Fan, Jason Lin, Pumbaa Wang