Patents by Inventor Paul Fan

Paul Fan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12234991
    Abstract: A solid pellet fueled apparatus having a duel auger system and multi/high speed auger motor is disclosed. The duel auger may include first and second auger blades mounted on a single auger shaft having blade pitches configured to convey solid fuel in opposite directions towards a central burn pot. Each auger blade may service a separate solid fuel compartment provided in a single hopper. The auger motor may have a high-speed setting that may be selected for solid fuel clean out.
    Type: Grant
    Filed: July 17, 2023
    Date of Patent: February 25, 2025
    Assignee: WH PRODUCTS, LLC
    Inventors: Paul J. Simon, Michael R. Giebel, Xianjia Fan
  • Patent number: 12201503
    Abstract: A nonwoven web for an absorbent article is provided. The absorbent article comprises the nonwoven web as a core wrap. A method for producing the absorbent article is also provided. The nonwoven web comprises a first nonwoven layer comprising filament fibers, a second nonwoven layer comprising filaments fibers, a third nonwoven layer comprising staple fibers disposed between the first and second nonwoven layers. A total basis weight of the first and second nonwoven layers is not less than about 10 gsm. The third nonwoven layer has a basis weight no greater than about 4 gsm. The nonwoven web comprises pores, wherein greater than about 80% of the pores have a pore size equal to or smaller than about 40 ?m, and wherein less than about 10% of the pores have a pore size equal to or greater than about 45 ?m.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: January 21, 2025
    Assignee: The Procter & Gamble Company
    Inventors: Yi Yuan, Paul Thomas Pineda Contreras, Yufei Shan, Gueltekin Erdem, Yibo Fan, Ekaterina Ponomarenko
  • Patent number: 9916447
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: March 13, 2018
    Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE (BEIJING) COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
  • Patent number: 9444834
    Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.
    Type: Grant
    Filed: February 4, 2013
    Date of Patent: September 13, 2016
    Assignee: Beijing Qihoo Technology Company Limited
    Inventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
  • Publication number: 20160012224
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Application
    Filed: September 22, 2015
    Publication date: January 14, 2016
    Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi ZHOU, Wenbin ZHENG, He YU, Paul FAN
  • Patent number: 9177141
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: November 3, 2015
    Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE(BEIJING) COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
  • Publication number: 20150207810
    Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.
    Type: Application
    Filed: February 4, 2013
    Publication date: July 23, 2015
    Inventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
  • Publication number: 20130174257
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Application
    Filed: August 8, 2011
    Publication date: July 4, 2013
    Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
  • Patent number: 7784098
    Abstract: A computer system operation registers as an event when an operation potentially characteristic of malware occurs. Events are scored and when a threshold is reached indicative of a possible malware infection a restore point is created. Many restore points are created. When a user decides to restore the system because of the presence of malware a malware report is retrieved. The malware report describes characteristics of a particular piece of malware. The malware report is compared to the restore point logs that had been created earlier. Any number of malware reports are compared to the restore point logs. A restore point log that shares many of the same system changes or other effects also present in a malware report is likely to be an indication of the beginning of a malware infection. The matched restore point log is recommended to the user as the best restore point.
    Type: Grant
    Filed: July 14, 2005
    Date of Patent: August 24, 2010
    Assignee: Trend Micro, Inc.
    Inventors: Paul Fan, Jason Lin, Pumbaa Wang