Patents by Inventor Paul Fan

Paul Fan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240141092
    Abstract: A composition for forming a polyurethane foam is provided using polyol having a total unsaturation less than 0.04 meq/g, methylene diphenyl diisocyanate (MDI), and epoxidized soybean oil. The epoxidized soybean oil may comprise greater than about 5% by weight of the composition. A method for forming polyurethane foam using the aforementioned composition is also provided.
    Type: Application
    Filed: October 14, 2022
    Publication date: May 2, 2024
    Applicant: LEAR CORPORATION
    Inventors: Chi-Fan HSU, Matthew PHILLIPS, Mike WALKOWSKI, Paul FIELDING, Don HANBY, Wu Pan ZAGORSKI, Michelle A. PERENY
  • Patent number: 11960832
    Abstract: Machine learning, artificial intelligence, and other computer-implemented methods are used to identify various semantically important chunks in documents, automatically label them with appropriate datatypes and semantic roles, and use this enhanced information to assist authors and to support downstream processes. Chunk locations, datatypes, and semantic roles can often be automatically determined from what is here called “context”, to wit, the combination of their formatting, structure, and content; those of adjacent or nearby content; overall patterns of occurrence in a document, and similarities of all these things across documents (mainly but not exclusively among documents in the same document set).
    Type: Grant
    Filed: April 20, 2022
    Date of Patent: April 16, 2024
    Assignee: Docugami, Inc.
    Inventors: Andrew Paul Begun, Steven DeRose, Taqi Jaffri, Luis Marti Orosa, Michael B. Palmer, Jean Paoli, Christina Pavlopoulou, Elena Pricoiu, Swagatika Sarangi, Marcin Sawicki, Manar Shehadeh, Michael Taron, Bhaven Toprani, Zubin Rustom Wadia, David Watson, Eric White, Joshua Yongshin Fan, Kush Gupta, Andrew Minh Hoang, Zhanlin Liu, Jerome George Paliakkara, Zhaofeng Wu, Yue Zhang, Xiaoquan Zhou
  • Publication number: 20240103618
    Abstract: Methods and apparatus for correcting the gaze direction and the origin (entrance pupil) in gaze tracking systems. During enrollment after an eye model is obtained, the pose of the eye when looking at a target prompt is determined. This information is used to estimate the true visual axis of the eye. The visual axis may then be used to correct the point of view (PoV) with respect to the display during use. If a clip-on lens is present, a corrected gaze axis may be calculated based on the known optical characteristics and pose of the clip-on lens. A clip-on corrected entrance pupil may then be estimated by firing two or more virtual rays through the clip-on lens to determine the intersection between the rays and the corrected gaze axis.
    Type: Application
    Filed: September 19, 2023
    Publication date: March 28, 2024
    Applicant: Apple Inc.
    Inventors: Julia Benndorf, Qichao Fan, Julian K. Shutzberg, Paul A. Lacey, Hua Gao
  • Patent number: 11938922
    Abstract: A motion control system that includes a support motion control system and a body motion control system. The body motion control system includes passive motion control components and active motion control components.
    Type: Grant
    Filed: September 15, 2020
    Date of Patent: March 26, 2024
    Assignee: APPLE INC.
    Inventors: Akhil J. Madhani, Robin A. Auckland, Giles D. Wood, Peteris K. Augenbergs, Xingchen Fan, Jonathan L. Hall, Paul J. Keas
  • Publication number: 20240091758
    Abstract: The invention concerns a sonocatalyst which is suitable for promoting a chemical reaction initiated by ultrasound irradiation. The invention also relates to a method of catalysing a reaction by exposing the sonocatalyst to ultrasound. The invention also relates to the use of a sonocatalyst as described herein in a method as described herein.
    Type: Application
    Filed: December 6, 2021
    Publication date: March 21, 2024
    Inventors: James KWAN, Qianwenhao FAN, Xiaoqian SU, Paul Wen LIU, Umesh Sai JONNALAGADDA, Lakshmi Deepika BHARATULA
  • Patent number: 11926019
    Abstract: A coated abrasive article includes a substrate and a plurality of abrasive particles overlying the substrate, and the plurality of abrasive particles including tapered abrasive particles having a taper fraction standard deviation of at least 0.025 and not greater than 0.090.
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: March 12, 2024
    Assignee: SAINT-GOBAIN CERAMICS & PLASTICS, INC.
    Inventors: Samuel S. Marlin, Ralph Bauer, Stefan Vujcic, Paul W. Rehrig, Marie-Camille Auscher, Darrell K. Everts, Hua Fan, Sujatha K. Iyengar, Christopher Arcona, Anthony Martone, Brahmanandam V. Tanikella
  • Patent number: 9916447
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: March 13, 2018
    Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE (BEIJING) COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
  • Patent number: 9444834
    Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.
    Type: Grant
    Filed: February 4, 2013
    Date of Patent: September 13, 2016
    Assignee: Beijing Qihoo Technology Company Limited
    Inventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
  • Publication number: 20160012224
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Application
    Filed: September 22, 2015
    Publication date: January 14, 2016
    Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi ZHOU, Wenbin ZHENG, He YU, Paul FAN
  • Patent number: 9177141
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: November 3, 2015
    Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE(BEIJING) COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
  • Publication number: 20150207810
    Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.
    Type: Application
    Filed: February 4, 2013
    Publication date: July 23, 2015
    Inventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
  • Publication number: 20130174257
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Application
    Filed: August 8, 2011
    Publication date: July 4, 2013
    Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
  • Patent number: 7784098
    Abstract: A computer system operation registers as an event when an operation potentially characteristic of malware occurs. Events are scored and when a threshold is reached indicative of a possible malware infection a restore point is created. Many restore points are created. When a user decides to restore the system because of the presence of malware a malware report is retrieved. The malware report describes characteristics of a particular piece of malware. The malware report is compared to the restore point logs that had been created earlier. Any number of malware reports are compared to the restore point logs. A restore point log that shares many of the same system changes or other effects also present in a malware report is likely to be an indication of the beginning of a malware infection. The matched restore point log is recommended to the user as the best restore point.
    Type: Grant
    Filed: July 14, 2005
    Date of Patent: August 24, 2010
    Assignee: Trend Micro, Inc.
    Inventors: Paul Fan, Jason Lin, Pumbaa Wang