Patents by Inventor Yuchen Zhou

Yuchen Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11550911
    Abstract: Techniques for multi-representational learning models for static analysis of source code are disclosed. In some embodiments, a system/process/computer program product for multi-representational learning models for static analysis of source code includes storing on a networked device a set comprising one or more multi-representation learning (MRL) models for static analysis of source code; performing a static analysis of source code associated with a sample received at the network device, wherein performing the static analysis includes using at least one stored MRL model; and determining that the sample is malicious based at least in part on the static analysis of the source code associated with the received sample, and in response to determining that the sample is malicious, performing an action based on a security policy.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: January 10, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Brody James Kutt, William Redington Hewlett, II, Oleksii Starov, Yuchen Zhou, Fang Liu
  • Patent number: 11541391
    Abstract: The current invention relates to the method and apparatus to magnetically separate biological entities with magnetic labels from a fluid sample. The claimed magnetic separation device removes biological entities with magnetic labels from its fluidic solution by using a soft-magnetic center pole with two soft-magnetic side poles. The claimed device further includes processes to dissociate entities conglomerate after magnetic separation.
    Type: Grant
    Filed: September 9, 2019
    Date of Patent: January 3, 2023
    Assignee: Applied Cells Inc.
    Inventor: Yuchen Zhou
  • Publication number: 20220368671
    Abstract: To perform pattern-based detection of malicious URLs, patterns are first generated from known URLs to build a pattern repository. A URL is first normalized and parsed, and keywords are extracted and stored in an additional repository of keywords. Tokens are then determined from the parsed URL and tags are associated with the parsed substrings. Substring text may also be replaced with general identifying information. Patterns generated from known malicious and benign URLs satisfying certain criteria are published to a pattern repository of which can be accessed during subsequent detection operations. During detection, upon identifying a request which indicates an unknown URL, the URL is parsed and tokenized to generate a pattern. The repository of malicious URL patterns is queried to determine if a matching malicious URL pattern can be identified. If a matching malicious URL pattern is identified, the URL is detected as malicious.
    Type: Application
    Filed: July 7, 2022
    Publication date: November 17, 2022
    Inventors: Fang Liu, Yuchen Zhou, Jun Wang
  • Publication number: 20220345487
    Abstract: Web sites are crawled using multiple browser profiles to avoid malicious cloaking. Based on web page content returned from HTTP requests using the multiple browser profiles, web sites returning substantively different content to HTTP requests for different browser profiles are identified. Web sites are further filtered by common cloaking behavior, and redirect scripts are extracted from web page content that performed cloaking. Signatures comprising tokenized versions of the redirect scripts are generated and compared to a database of known cloaking signatures. URLs corresponding to signatures having approximate matches with signatures in the database are flagged for recrawling. Recrawled URLs are verified for malicious cloaking again using HTTP requests from multiple browser profiles.
    Type: Application
    Filed: July 12, 2022
    Publication date: October 27, 2022
    Inventors: Oleksii Starov, Zhanhao Chen, Yuchen Zhou, Fang Liu
  • Patent number: 11460927
    Abstract: A system automatically frames locations by detecting a user's presence within a virtual detection space. The system detects sound in the detection space and converts the sound into electrical signals. The electrical signals are converted into a digital signals at common or periodic sampling rates. The system identifies speech segments in the digital signals and attenuates noise like components within or adjacent to them. The system identifies the physical locations of a speech source generating the speech segments and automatically adjusts a camera framing based on the estimated location of the active speech source generating the speech segments.
    Type: Grant
    Filed: August 24, 2020
    Date of Patent: October 4, 2022
    Assignee: DTEN, Inc.
    Inventors: Jinxin Dong, Sally Tung, Yuchen Zhou, Wei Liu, Jin Guo
  • Patent number: 11443760
    Abstract: A system automatically controls an electronic device's audio by detecting an active sound source presence within an auditory detection space. The system transitions the electronic device to selectively output a desired sound when the active sound source presence is detected and detects sound in the auditory detection space. The system enhances sound and transforms it into electrical signals. The system converts the electrical signals into a digital signal and identifies active sound segments in the digital signals. The system attenuates noise components in the digital signals and locates the physical location of the active sound source. It adjusts an output automatically by muting a second sound source in a second detection space.
    Type: Grant
    Filed: November 30, 2020
    Date of Patent: September 13, 2022
    Assignee: DTEN, Inc.
    Inventors: Wei Liu, Jin Guo, Sally Tung, Yuchen Zhou, Jinxin Dong
  • Patent number: 11444977
    Abstract: Web sites are crawled using multiple browser profiles to avoid malicious cloaking. Based on web page content returned from HTTP requests using the multiple browser profiles, web sites returning substantively different content to HTTP requests for different browser profiles are identified. Web sites are further filtered by common cloaking behavior, and redirect scripts are extracted from web page content that performed cloaking. Signatures comprising tokenized versions of the redirect scripts are generated and compared to a database of known cloaking signatures. URLs corresponding to signatures having approximate matches with signatures in the database are flagged for recrawling. Recrawled URLs are verified for malicious cloaking again using HTTP requests from multiple browser profiles.
    Type: Grant
    Filed: October 22, 2019
    Date of Patent: September 13, 2022
    Assignee: Palo Alto Networks, Inc.
    Inventors: Oleksii Starov, Zhanhao Chen, Yuchen Zhou, Fang Liu
  • Publication number: 20220258161
    Abstract: A method for separating biological entities in a fluid sample, which contains small, medium, and large biological entities, includes the steps introducing the fluid sample into a first microfluidic device as two streams along two sidewalls thereof; applying a first power to the first microfluidic device to exert a first acoustic radiation pressure to produce a first output fluid having a higher relative fraction of the large biological entities than the fluid sample and a second output fluid having a lower relative fraction of the large biological entities than the fluid sample; introducing the second output fluid into a second microfluidic device as two streams along two sidewalls thereof; and applying a second power, which is higher than the first power, to the second microfluidic device to exert a second acoustic radiation pressure to produce a third output fluid having a higher relative fraction of the medium biological entities than the fluid sample.
    Type: Application
    Filed: February 15, 2021
    Publication date: August 18, 2022
    Inventor: Yuchen Zhou
  • Patent number: 11418485
    Abstract: To perform pattern-based detection of malicious URLs, patterns are first generated from known URLs to build a pattern repository. A URL is first normalized and parsed, and keywords are extracted and stored in an additional repository of keywords. Tokens are then determined from the parsed URL and tags are associated with the parsed substrings. Substring text may also be replaced with general identifying information. Patterns generated from known malicious and benign URLs satisfying certain criteria are published to a pattern repository of which can be accessed during subsequent detection operations. During detection, upon identifying a request which indicates an unknown URL, the URL is parsed and tokenized to generate a pattern. The repository of malicious URL patterns is queried to determine if a matching malicious URL pattern can be identified. If a matching malicious URL pattern is identified, the URL is detected as malicious.
    Type: Grant
    Filed: July 28, 2020
    Date of Patent: August 16, 2022
    Assignee: Palo Alto Networks, Inc.
    Inventors: Fang Liu, Yuchen Zhou, Jun Wang
  • Publication number: 20220198808
    Abstract: An obstacle recognition method and apparatus, a computer device, and a storage medium are provided. The method comprises: acquiring point cloud data scanned by LiDAR and time-sequence pose information of a vehicle; determining a spliced image of an eye bird view according to the point cloud data, the time-sequence pose information, and a historical frame embedded image; inputting the spliced image into a preset first CNN model to obtain a current frame embedded image and pixel-level information of the eye bird view; determining recognition information of at least one obstacle according to the current frame embedded image and pixel-level information.
    Type: Application
    Filed: April 17, 2019
    Publication date: June 23, 2022
    Inventors: Shixi CHEN, Yuchen ZHOU, Hua ZHONG, Xu HAN
  • Publication number: 20220134342
    Abstract: A microfluidic system for separating biological entities includes a cooling device including a thermoelectric heat pump, a first fan, and a first heat exchanger disposed between the first fan and the thermoelectric heat pump; a first housing structure having a first shell that encases the first fan and the first heat exchanger; a microfluidic device and one or more piezoelectric transducers attached thereto; and a second housing structure reversibly attached to the first housing structure and having a second shell that encloses therein the microfluidic device and the one or more piezoelectric transducers. When the first and second housing structures are coupled, a first air passage is formed between a side of the first heat exchanger and an end of the microfluidic device, a second air passage is formed between the first fan and the piezoelectric transducers, thereby allowing air to circulate between the first and second air passages.
    Type: Application
    Filed: February 4, 2021
    Publication date: May 5, 2022
    Inventor: Yuchen Zhou
  • Patent number: 11313834
    Abstract: The invention describes a family of sensors for assaying macro-molecules and/or biological cells in solution. The invention also describes methods of making and using the sensors. Each sensor has the form of a well (a hollow cylinder having a floor but no lid) or a trench whose walls comprise a plurality of GMR or TMR devices. Suitably shaped magnets located below each well's floor pull labeled particles into the well/trench and up against the inner wall where a field gradient orients them for optimum detection. Any unattached labels that happen to also be in the well/trench are removed through suitably sized holes in the floor.
    Type: Grant
    Filed: July 31, 2013
    Date of Patent: April 26, 2022
    Assignee: Headway Technologies, Inc.
    Inventor: Yuchen Zhou
  • Publication number: 20220072548
    Abstract: A microfluidic device for sorting biological objects includes a microfluidic chip including a planar substrate having first and second planar surfaces, the planar substrate including first and second networks of channels recessed respectively from the first and second planar surfaces and fluidically connected by way of at least a through-hole in the planar substrate; a first lid attached to the first planar surface of the planar substrate and substantially covering the first network of channels; and a second lid attached to the second planar surface of the planar substrate and substantially covering the second network of channels; and one or more piezoelectric transducers attached to the first lid and/or the second lid and configured to generate first and second acoustic standing waves in a first linear channel of the first network of channels and a second linear channel of the second network of channels, respectively.
    Type: Application
    Filed: November 17, 2021
    Publication date: March 10, 2022
    Inventors: Bing K. Yen, Yuchen Zhou
  • Publication number: 20220038424
    Abstract: To perform pattern-based detection of malicious URLs, patterns are first generated from known URLs to build a pattern repository. A URL is first normalized and parsed, and keywords are extracted and stored in an additional repository of keywords. Tokens are then determined from the parsed URL and tags are associated with the parsed substrings. Substring text may also be replaced with general identifying information. Patterns generated from known malicious and benign URLs satisfying certain criteria are published to a pattern repository of which can be accessed during subsequent detection operations. During detection, upon identifying a request which indicates an unknown URL, the URL is parsed and tokenized to generate a pattern. The repository of malicious URL patterns is queried to determine if a matching malicious URL pattern can be identified. If a matching malicious URL pattern is identified, the URL is detected as malicious.
    Type: Application
    Filed: July 28, 2020
    Publication date: February 3, 2022
    Inventors: Fang Liu, Yuchen Zhou, Jun Wang
  • Publication number: 20210385232
    Abstract: Techniques for providing innocent until proven guilty (IUPG) solutions for building and using adversary resistant and false positive resistant deep learning models are disclosed. In some embodiments, a system, process, and/or computer program product includes storing a set comprising one or more innocent until proven guilty (IUPG) models for static analysis of a sample; performing a static analysis of content associated with the sample, wherein performing the static analysis includes using at least one stored IUPG model; and determining that the sample is malicious based at least in part on the static analysis of the content associated with the sample, and in response to determining that the sample is malicious, performing an action based on a security policy.
    Type: Application
    Filed: May 26, 2021
    Publication date: December 9, 2021
    Inventors: Brody James Kutt, Oleksii Starov, Yuchen Zhou, William Redington Hewlett, II
  • Publication number: 20210350822
    Abstract: A system automatically controls an electronic device's audio by detecting an active sound source presence within an auditory detection space. The system transitions the electronic device to selectively output a desired sound when the active sound source presence is detected and detects sound in the auditory detection space. The system enhances sound and transforms it into electrical signals. The system converts the electrical signals into a digital signal and identifies active sound segments in the digital signals. The system attenuates noise components in the digital signals and locates the physical location of the active sound source. It adjusts an output automatically by muting a second sound source in a second detection space.
    Type: Application
    Filed: November 30, 2020
    Publication date: November 11, 2021
    Inventors: Wei Liu, Jin Guo, Sally Tung, Yuchen Zhou, Jinxin Dong
  • Publication number: 20210294424
    Abstract: A system automatically frames locations by detecting a user's presence within a virtual detection space. The system detects sound in the detection space and converts the sound into electrical signals. The electrical signals are converted into a digital signals at common or periodic sampling rates. The system identifies speech segments in the digital signals and attenuates noise like components within or adjacent to them. The system identifies the physical locations of a speech source generating the speech segments and automatically adjusts a camera framing based on the estimated location of the active speech source generating the speech segments.
    Type: Application
    Filed: August 24, 2020
    Publication date: September 23, 2021
    Inventors: Jinxin Dong, Sally Tung, Yuchen Zhou, Wei Liu, Jin Guo
  • Publication number: 20210240825
    Abstract: Techniques for multi-representational learning models for static analysis of source code are disclosed. In some embodiments, a system/process/computer program product for multi-representational learning models for static analysis of source code includes storing on a networked device a set comprising one or more multi-representation learning (MRL) models for static analysis of source code; performing a static analysis of source code associated with a sample received at the network device, wherein performing the static analysis includes using at least one stored MRL model; and determining that the sample is malicious based at least in part on the static analysis of the source code associated with the received sample, and in response to determining that the sample is malicious, perform an action based on a security policy.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Inventors: Brody James Kutt, William Redington Hewlett, II, Oleksii Starov, Yuchen Zhou, Fang Liu
  • Publication number: 20210240826
    Abstract: Techniques for building multi-representational learning models for static analysis of source code are disclosed. In some embodiments, a system/process/computer program product for building multi-representational learning models for static analysis of source code includes receiving training data, wherein the training data includes a set of source code files for training a multi-representational learning (MRL) model for classifying malicious source code and benign source code based on a static analysis; generating a first feature vector based on a set of characters extracted from the set of source code files; generating a second feature vector based on a set of tokens extracted from the set of source code files; and performing an ensemble of the first feature vector and the second feature vector to form a target feature vector for classifying malicious source code and benign source code based on the static analysis.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Inventors: Brody James Kutt, William Redington Hewlett, II, Oleksii Starov, Yuchen Zhou, Fang Liu
  • Publication number: 20210227203
    Abstract: The current invention describes methods, techniques, devices, and apparatuses for graphics and display processing for virtual and augmented reality. In some examples, this disclosure describes a projection display system capable of rendering and displaying multiple virtual objects or virtual objects utilizing an estimated distance between a real world object and a user and adjusting a focus depth of said display system. In some examples, this disclosure proposes techniques for rendering and displaying multiple virtual objects or virtual objects at the same time at multiple different distances to a user.
    Type: Application
    Filed: April 6, 2021
    Publication date: July 22, 2021
    Inventor: Yuchen Zhou