Patents by Inventor Wenhui Yu

Wenhui Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10320877
    Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.
    Type: Grant
    Filed: April 20, 2015
    Date of Patent: June 11, 2019
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, Luke Murphey, David Hazekamp
  • Publication number: 20190163350
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Application
    Filed: January 31, 2019
    Publication date: May 30, 2019
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey
  • Publication number: 20190166146
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Application
    Filed: January 31, 2019
    Publication date: May 30, 2019
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Publication number: 20190166145
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Application
    Filed: January 31, 2019
    Publication date: May 30, 2019
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu
  • Patent number: 10254934
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: August 1, 2015
    Date of Patent: April 9, 2019
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey
  • Patent number: 10250628
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: April 2, 2019
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 10237292
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: April 30, 2016
    Date of Patent: March 19, 2019
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu
  • Patent number: 10217394
    Abstract: A display driving apparatus including a pixel reorder circuit, an image processing circuit and a driver circuit is provided. The pixel reorder circuit is configured to reorder pixels of frame data. The frame data includes previous frame data. The image processing circuit is coupled to the pixel reorder circuit. The image processing circuit is configured to perform an image processing operation on the frame data that the pixels have been reordered. The driver circuit is coupled to the pixel reorder circuit. The driver circuit is configured to drive a display according to the previous frame data that pixels have been reordered and the current frame data. Each of the pixels of the frame data includes a first sub-pixel set and a second sub-pixel set. In addition, a display driving method is also provided.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: February 26, 2019
    Assignee: Novatek Microelectronics Corp.
    Inventors: Wenhui Yu, Chao-Yang Kao, Chiung-Liang Lin
  • Patent number: 9940214
    Abstract: In one embodiment, a method includes receiving a plurality of measurements, each measurement associated with a different parameter, calculating an index based on the measurements, and generating a visual index display indicating the index, the visual index display comprising a first portion and a second portion, each portion configured for selection by a user. A first set of measurements is displayed when the first portion is selected and a second set of measurements is displayed when the second portion is selected. The first set of measurements is a subset of the second set of measurements. An apparatus and logic are also disclosed herein.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: April 10, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Stephan Shurtleff, Wenhui Yu
  • Publication number: 20180082628
    Abstract: A display driving apparatus including a pixel reorder circuit, an image processing circuit and a driver circuit is provided. The pixel reorder circuit is configured to reorder pixels of frame data. The frame data includes previous frame data. The image processing circuit is coupled to the pixel reorder circuit. The image processing circuit is configured to perform an image processing operation on the frame data that the pixels have been reordered. The driver circuit is coupled to the pixel reorder circuit. The driver circuit is configured to drive a display according to the previous frame data that pixels have been reordered and the current frame data. Each of the pixels of the frame data includes a first sub-pixel set and a second sub-pixel set. In addition, a display driving method is also provided.
    Type: Application
    Filed: September 30, 2016
    Publication date: March 22, 2018
    Applicant: Novatek Microelectronics Corp.
    Inventors: Wenhui Yu, Chao-Yang Kao, Chiung-Liang Lin
  • Publication number: 20180069887
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Application
    Filed: October 31, 2017
    Publication date: March 8, 2018
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 9848008
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: November 1, 2016
    Date of Patent: December 19, 2017
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 9807173
    Abstract: In one embodiment, a method includes: determining that a notification is to be transmitted to at least one shared device of a household, the shared device comprising a display screen and being shared by a plurality of members of the household; identifying a plurality of personal devices currently located in the household, each of the plurality of personal devices belonging to a single member of the household; selecting a notification format to use for the notification, the selected notification format corresponding to a highest priority user profile associated with a personal device from the identified plurality of personal devices currently located in said household; and transmitting the notification in the selected notification format to the at least one shared device for display.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: October 31, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Shurtleff, Wenhui Yu
  • Patent number: 9584853
    Abstract: In one embodiment, a method includes: retrieving data relevant to a first screen of an electronic program guide; generating a graphical user interface using the retrieved data, in which: a first node identifies the first screen; second nodes identify second screens accessed after the first screen, each of the second nodes being positioned to one side of the first node; the first node is connected to each of the second nodes by connectors, each of the connectors pointing towards each of the second nodes and having a width proportional to a volume of navigation flow received by each of the second nodes from the first node; wherein at least one node comprises a visual indication indicating an average time spent by the users on an identified screen of the electronic program guide; and rendering the generated graphical user interface on a display screen of the computing device.
    Type: Grant
    Filed: June 16, 2015
    Date of Patent: February 28, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Olivier Frebourg, Paul Harding, Robert Cressey, Wenhui Yu
  • Publication number: 20170048264
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Application
    Filed: November 1, 2016
    Publication date: February 16, 2017
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Publication number: 20170031565
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Application
    Filed: August 1, 2015
    Publication date: February 2, 2017
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey
  • Publication number: 20170034196
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Application
    Filed: April 30, 2016
    Publication date: February 2, 2017
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu
  • Publication number: 20160373803
    Abstract: In one embodiment, a method includes: retrieving data relevant to a first screen of an electronic program guide; generating a graphical user interface using the retrieved data, in which: a first node identifies the first screen; second nodes identify second screens accessed after the first screen, each of the second nodes being positioned to one side of the first node; the first node is connected to each of the second nodes by connectors, each of the connectors pointing towards each of the second nodes and having a width proportional to a volume of navigation flow received by each of the second nodes from the first node; wherein at least one node comprises a visual indication indicating an average time spent by the users on an identified screen of the electronic program guide; and rendering the generated graphical user interface on a display screen of the computing device.
    Type: Application
    Filed: June 16, 2015
    Publication date: December 22, 2016
    Inventors: Olivier FREBOURG, Paul HARDING, Robert CRESSEY, Wenhui YU
  • Patent number: 9516052
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: August 1, 2015
    Date of Patent: December 6, 2016
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Publication number: 20160308733
    Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.
    Type: Application
    Filed: April 20, 2015
    Publication date: October 20, 2016
    Inventors: Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, Luke Murphey, David Hazekamp