Patents by Inventor Paul Fan
Paul Fan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240141092Abstract: A composition for forming a polyurethane foam is provided using polyol having a total unsaturation less than 0.04 meq/g, methylene diphenyl diisocyanate (MDI), and epoxidized soybean oil. The epoxidized soybean oil may comprise greater than about 5% by weight of the composition. A method for forming polyurethane foam using the aforementioned composition is also provided.Type: ApplicationFiled: October 14, 2022Publication date: May 2, 2024Applicant: LEAR CORPORATIONInventors: Chi-Fan HSU, Matthew PHILLIPS, Mike WALKOWSKI, Paul FIELDING, Don HANBY, Wu Pan ZAGORSKI, Michelle A. PERENY
-
Patent number: 11960832Abstract: Machine learning, artificial intelligence, and other computer-implemented methods are used to identify various semantically important chunks in documents, automatically label them with appropriate datatypes and semantic roles, and use this enhanced information to assist authors and to support downstream processes. Chunk locations, datatypes, and semantic roles can often be automatically determined from what is here called “context”, to wit, the combination of their formatting, structure, and content; those of adjacent or nearby content; overall patterns of occurrence in a document, and similarities of all these things across documents (mainly but not exclusively among documents in the same document set).Type: GrantFiled: April 20, 2022Date of Patent: April 16, 2024Assignee: Docugami, Inc.Inventors: Andrew Paul Begun, Steven DeRose, Taqi Jaffri, Luis Marti Orosa, Michael B. Palmer, Jean Paoli, Christina Pavlopoulou, Elena Pricoiu, Swagatika Sarangi, Marcin Sawicki, Manar Shehadeh, Michael Taron, Bhaven Toprani, Zubin Rustom Wadia, David Watson, Eric White, Joshua Yongshin Fan, Kush Gupta, Andrew Minh Hoang, Zhanlin Liu, Jerome George Paliakkara, Zhaofeng Wu, Yue Zhang, Xiaoquan Zhou
-
Publication number: 20240103618Abstract: Methods and apparatus for correcting the gaze direction and the origin (entrance pupil) in gaze tracking systems. During enrollment after an eye model is obtained, the pose of the eye when looking at a target prompt is determined. This information is used to estimate the true visual axis of the eye. The visual axis may then be used to correct the point of view (PoV) with respect to the display during use. If a clip-on lens is present, a corrected gaze axis may be calculated based on the known optical characteristics and pose of the clip-on lens. A clip-on corrected entrance pupil may then be estimated by firing two or more virtual rays through the clip-on lens to determine the intersection between the rays and the corrected gaze axis.Type: ApplicationFiled: September 19, 2023Publication date: March 28, 2024Applicant: Apple Inc.Inventors: Julia Benndorf, Qichao Fan, Julian K. Shutzberg, Paul A. Lacey, Hua Gao
-
Patent number: 11938922Abstract: A motion control system that includes a support motion control system and a body motion control system. The body motion control system includes passive motion control components and active motion control components.Type: GrantFiled: September 15, 2020Date of Patent: March 26, 2024Assignee: APPLE INC.Inventors: Akhil J. Madhani, Robin A. Auckland, Giles D. Wood, Peteris K. Augenbergs, Xingchen Fan, Jonathan L. Hall, Paul J. Keas
-
Publication number: 20240091758Abstract: The invention concerns a sonocatalyst which is suitable for promoting a chemical reaction initiated by ultrasound irradiation. The invention also relates to a method of catalysing a reaction by exposing the sonocatalyst to ultrasound. The invention also relates to the use of a sonocatalyst as described herein in a method as described herein.Type: ApplicationFiled: December 6, 2021Publication date: March 21, 2024Inventors: James KWAN, Qianwenhao FAN, Xiaoqian SU, Paul Wen LIU, Umesh Sai JONNALAGADDA, Lakshmi Deepika BHARATULA
-
Patent number: 11926019Abstract: A coated abrasive article includes a substrate and a plurality of abrasive particles overlying the substrate, and the plurality of abrasive particles including tapered abrasive particles having a taper fraction standard deviation of at least 0.025 and not greater than 0.090.Type: GrantFiled: December 23, 2020Date of Patent: March 12, 2024Assignee: SAINT-GOBAIN CERAMICS & PLASTICS, INC.Inventors: Samuel S. Marlin, Ralph Bauer, Stefan Vujcic, Paul W. Rehrig, Marie-Camille Auscher, Darrell K. Everts, Hua Fan, Sujatha K. Iyengar, Christopher Arcona, Anthony Martone, Brahmanandam V. Tanikella
-
Patent number: 9916447Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: GrantFiled: September 22, 2015Date of Patent: March 13, 2018Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE (BEIJING) COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
-
Patent number: 9444834Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.Type: GrantFiled: February 4, 2013Date of Patent: September 13, 2016Assignee: Beijing Qihoo Technology Company LimitedInventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
-
Publication number: 20160012224Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: ApplicationFiled: September 22, 2015Publication date: January 14, 2016Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Hongyi ZHOU, Wenbin ZHENG, He YU, Paul FAN
-
Patent number: 9177141Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: GrantFiled: August 8, 2011Date of Patent: November 3, 2015Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE(BEIJING) COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
-
Publication number: 20150207810Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.Type: ApplicationFiled: February 4, 2013Publication date: July 23, 2015Inventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
-
Publication number: 20130174257Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: ApplicationFiled: August 8, 2011Publication date: July 4, 2013Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
-
Patent number: 7784098Abstract: A computer system operation registers as an event when an operation potentially characteristic of malware occurs. Events are scored and when a threshold is reached indicative of a possible malware infection a restore point is created. Many restore points are created. When a user decides to restore the system because of the presence of malware a malware report is retrieved. The malware report describes characteristics of a particular piece of malware. The malware report is compared to the restore point logs that had been created earlier. Any number of malware reports are compared to the restore point logs. A restore point log that shares many of the same system changes or other effects also present in a malware report is likely to be an indication of the beginning of a malware infection. The matched restore point log is recommended to the user as the best restore point.Type: GrantFiled: July 14, 2005Date of Patent: August 24, 2010Assignee: Trend Micro, Inc.Inventors: Paul Fan, Jason Lin, Pumbaa Wang