Patents by Inventor Wenhui Yu
Wenhui Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10320877Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.Type: GrantFiled: April 20, 2015Date of Patent: June 11, 2019Assignee: Splunk Inc.Inventors: Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, Luke Murphey, David Hazekamp
-
Publication number: 20190163350Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: ApplicationFiled: January 31, 2019Publication date: May 30, 2019Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey
-
Publication number: 20190166146Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: ApplicationFiled: January 31, 2019Publication date: May 30, 2019Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
-
Publication number: 20190166145Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: ApplicationFiled: January 31, 2019Publication date: May 30, 2019Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu
-
Patent number: 10254934Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: GrantFiled: August 1, 2015Date of Patent: April 9, 2019Assignee: Splunk Inc.Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey
-
Patent number: 10250628Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: GrantFiled: October 31, 2017Date of Patent: April 2, 2019Assignee: Splunk Inc.Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
-
Patent number: 10237292Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: GrantFiled: April 30, 2016Date of Patent: March 19, 2019Assignee: Splunk Inc.Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu
-
Patent number: 10217394Abstract: A display driving apparatus including a pixel reorder circuit, an image processing circuit and a driver circuit is provided. The pixel reorder circuit is configured to reorder pixels of frame data. The frame data includes previous frame data. The image processing circuit is coupled to the pixel reorder circuit. The image processing circuit is configured to perform an image processing operation on the frame data that the pixels have been reordered. The driver circuit is coupled to the pixel reorder circuit. The driver circuit is configured to drive a display according to the previous frame data that pixels have been reordered and the current frame data. Each of the pixels of the frame data includes a first sub-pixel set and a second sub-pixel set. In addition, a display driving method is also provided.Type: GrantFiled: September 30, 2016Date of Patent: February 26, 2019Assignee: Novatek Microelectronics Corp.Inventors: Wenhui Yu, Chao-Yang Kao, Chiung-Liang Lin
-
Patent number: 9940214Abstract: In one embodiment, a method includes receiving a plurality of measurements, each measurement associated with a different parameter, calculating an index based on the measurements, and generating a visual index display indicating the index, the visual index display comprising a first portion and a second portion, each portion configured for selection by a user. A first set of measurements is displayed when the first portion is selected and a second set of measurements is displayed when the second portion is selected. The first set of measurements is a subset of the second set of measurements. An apparatus and logic are also disclosed herein.Type: GrantFiled: August 29, 2014Date of Patent: April 10, 2018Assignee: Cisco Technology, Inc.Inventors: Mark Stephan Shurtleff, Wenhui Yu
-
Publication number: 20180082628Abstract: A display driving apparatus including a pixel reorder circuit, an image processing circuit and a driver circuit is provided. The pixel reorder circuit is configured to reorder pixels of frame data. The frame data includes previous frame data. The image processing circuit is coupled to the pixel reorder circuit. The image processing circuit is configured to perform an image processing operation on the frame data that the pixels have been reordered. The driver circuit is coupled to the pixel reorder circuit. The driver circuit is configured to drive a display according to the previous frame data that pixels have been reordered and the current frame data. Each of the pixels of the frame data includes a first sub-pixel set and a second sub-pixel set. In addition, a display driving method is also provided.Type: ApplicationFiled: September 30, 2016Publication date: March 22, 2018Applicant: Novatek Microelectronics Corp.Inventors: Wenhui Yu, Chao-Yang Kao, Chiung-Liang Lin
-
Publication number: 20180069887Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: ApplicationFiled: October 31, 2017Publication date: March 8, 2018Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
-
Patent number: 9848008Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: GrantFiled: November 1, 2016Date of Patent: December 19, 2017Assignee: Splunk Inc.Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
-
Patent number: 9807173Abstract: In one embodiment, a method includes: determining that a notification is to be transmitted to at least one shared device of a household, the shared device comprising a display screen and being shared by a plurality of members of the household; identifying a plurality of personal devices currently located in the household, each of the plurality of personal devices belonging to a single member of the household; selecting a notification format to use for the notification, the selected notification format corresponding to a highest priority user profile associated with a personal device from the identified plurality of personal devices currently located in said household; and transmitting the notification in the selected notification format to the at least one shared device for display.Type: GrantFiled: March 26, 2015Date of Patent: October 31, 2017Assignee: Cisco Technology, Inc.Inventors: Mark Shurtleff, Wenhui Yu
-
Patent number: 9584853Abstract: In one embodiment, a method includes: retrieving data relevant to a first screen of an electronic program guide; generating a graphical user interface using the retrieved data, in which: a first node identifies the first screen; second nodes identify second screens accessed after the first screen, each of the second nodes being positioned to one side of the first node; the first node is connected to each of the second nodes by connectors, each of the connectors pointing towards each of the second nodes and having a width proportional to a volume of navigation flow received by each of the second nodes from the first node; wherein at least one node comprises a visual indication indicating an average time spent by the users on an identified screen of the electronic program guide; and rendering the generated graphical user interface on a display screen of the computing device.Type: GrantFiled: June 16, 2015Date of Patent: February 28, 2017Assignee: Cisco Technology, Inc.Inventors: Olivier Frebourg, Paul Harding, Robert Cressey, Wenhui Yu
-
Publication number: 20170048264Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: ApplicationFiled: November 1, 2016Publication date: February 16, 2017Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
-
Publication number: 20170031565Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: ApplicationFiled: August 1, 2015Publication date: February 2, 2017Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey
-
Publication number: 20170034196Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: ApplicationFiled: April 30, 2016Publication date: February 2, 2017Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu
-
Publication number: 20160373803Abstract: In one embodiment, a method includes: retrieving data relevant to a first screen of an electronic program guide; generating a graphical user interface using the retrieved data, in which: a first node identifies the first screen; second nodes identify second screens accessed after the first screen, each of the second nodes being positioned to one side of the first node; the first node is connected to each of the second nodes by connectors, each of the connectors pointing towards each of the second nodes and having a width proportional to a volume of navigation flow received by each of the second nodes from the first node; wherein at least one node comprises a visual indication indicating an average time spent by the users on an identified screen of the electronic program guide; and rendering the generated graphical user interface on a display screen of the computing device.Type: ApplicationFiled: June 16, 2015Publication date: December 22, 2016Inventors: Olivier FREBOURG, Paul HARDING, Robert CRESSEY, Wenhui YU
-
Patent number: 9516052Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.Type: GrantFiled: August 1, 2015Date of Patent: December 6, 2016Assignee: Splunk Inc.Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
-
Publication number: 20160308733Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.Type: ApplicationFiled: April 20, 2015Publication date: October 20, 2016Inventors: Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, Luke Murphey, David Hazekamp