Patents by Inventor Yuchen Zhou

Yuchen Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220258161
    Abstract: A method for separating biological entities in a fluid sample, which contains small, medium, and large biological entities, includes the steps introducing the fluid sample into a first microfluidic device as two streams along two sidewalls thereof; applying a first power to the first microfluidic device to exert a first acoustic radiation pressure to produce a first output fluid having a higher relative fraction of the large biological entities than the fluid sample and a second output fluid having a lower relative fraction of the large biological entities than the fluid sample; introducing the second output fluid into a second microfluidic device as two streams along two sidewalls thereof; and applying a second power, which is higher than the first power, to the second microfluidic device to exert a second acoustic radiation pressure to produce a third output fluid having a higher relative fraction of the medium biological entities than the fluid sample.
    Type: Application
    Filed: February 15, 2021
    Publication date: August 18, 2022
    Inventor: Yuchen Zhou
  • Patent number: 11418485
    Abstract: To perform pattern-based detection of malicious URLs, patterns are first generated from known URLs to build a pattern repository. A URL is first normalized and parsed, and keywords are extracted and stored in an additional repository of keywords. Tokens are then determined from the parsed URL and tags are associated with the parsed substrings. Substring text may also be replaced with general identifying information. Patterns generated from known malicious and benign URLs satisfying certain criteria are published to a pattern repository of which can be accessed during subsequent detection operations. During detection, upon identifying a request which indicates an unknown URL, the URL is parsed and tokenized to generate a pattern. The repository of malicious URL patterns is queried to determine if a matching malicious URL pattern can be identified. If a matching malicious URL pattern is identified, the URL is detected as malicious.
    Type: Grant
    Filed: July 28, 2020
    Date of Patent: August 16, 2022
    Assignee: Palo Alto Networks, Inc.
    Inventors: Fang Liu, Yuchen Zhou, Jun Wang
  • Publication number: 20220198808
    Abstract: An obstacle recognition method and apparatus, a computer device, and a storage medium are provided. The method comprises: acquiring point cloud data scanned by LiDAR and time-sequence pose information of a vehicle; determining a spliced image of an eye bird view according to the point cloud data, the time-sequence pose information, and a historical frame embedded image; inputting the spliced image into a preset first CNN model to obtain a current frame embedded image and pixel-level information of the eye bird view; determining recognition information of at least one obstacle according to the current frame embedded image and pixel-level information.
    Type: Application
    Filed: April 17, 2019
    Publication date: June 23, 2022
    Inventors: Shixi CHEN, Yuchen ZHOU, Hua ZHONG, Xu HAN
  • Publication number: 20220134342
    Abstract: A microfluidic system for separating biological entities includes a cooling device including a thermoelectric heat pump, a first fan, and a first heat exchanger disposed between the first fan and the thermoelectric heat pump; a first housing structure having a first shell that encases the first fan and the first heat exchanger; a microfluidic device and one or more piezoelectric transducers attached thereto; and a second housing structure reversibly attached to the first housing structure and having a second shell that encloses therein the microfluidic device and the one or more piezoelectric transducers. When the first and second housing structures are coupled, a first air passage is formed between a side of the first heat exchanger and an end of the microfluidic device, a second air passage is formed between the first fan and the piezoelectric transducers, thereby allowing air to circulate between the first and second air passages.
    Type: Application
    Filed: February 4, 2021
    Publication date: May 5, 2022
    Inventor: Yuchen Zhou
  • Patent number: 11313834
    Abstract: The invention describes a family of sensors for assaying macro-molecules and/or biological cells in solution. The invention also describes methods of making and using the sensors. Each sensor has the form of a well (a hollow cylinder having a floor but no lid) or a trench whose walls comprise a plurality of GMR or TMR devices. Suitably shaped magnets located below each well's floor pull labeled particles into the well/trench and up against the inner wall where a field gradient orients them for optimum detection. Any unattached labels that happen to also be in the well/trench are removed through suitably sized holes in the floor.
    Type: Grant
    Filed: July 31, 2013
    Date of Patent: April 26, 2022
    Assignee: Headway Technologies, Inc.
    Inventor: Yuchen Zhou
  • Publication number: 20220072548
    Abstract: A microfluidic device for sorting biological objects includes a microfluidic chip including a planar substrate having first and second planar surfaces, the planar substrate including first and second networks of channels recessed respectively from the first and second planar surfaces and fluidically connected by way of at least a through-hole in the planar substrate; a first lid attached to the first planar surface of the planar substrate and substantially covering the first network of channels; and a second lid attached to the second planar surface of the planar substrate and substantially covering the second network of channels; and one or more piezoelectric transducers attached to the first lid and/or the second lid and configured to generate first and second acoustic standing waves in a first linear channel of the first network of channels and a second linear channel of the second network of channels, respectively.
    Type: Application
    Filed: November 17, 2021
    Publication date: March 10, 2022
    Inventors: Bing K. Yen, Yuchen Zhou
  • Publication number: 20220038424
    Abstract: To perform pattern-based detection of malicious URLs, patterns are first generated from known URLs to build a pattern repository. A URL is first normalized and parsed, and keywords are extracted and stored in an additional repository of keywords. Tokens are then determined from the parsed URL and tags are associated with the parsed substrings. Substring text may also be replaced with general identifying information. Patterns generated from known malicious and benign URLs satisfying certain criteria are published to a pattern repository of which can be accessed during subsequent detection operations. During detection, upon identifying a request which indicates an unknown URL, the URL is parsed and tokenized to generate a pattern. The repository of malicious URL patterns is queried to determine if a matching malicious URL pattern can be identified. If a matching malicious URL pattern is identified, the URL is detected as malicious.
    Type: Application
    Filed: July 28, 2020
    Publication date: February 3, 2022
    Inventors: Fang Liu, Yuchen Zhou, Jun Wang
  • Publication number: 20210385232
    Abstract: Techniques for providing innocent until proven guilty (IUPG) solutions for building and using adversary resistant and false positive resistant deep learning models are disclosed. In some embodiments, a system, process, and/or computer program product includes storing a set comprising one or more innocent until proven guilty (IUPG) models for static analysis of a sample; performing a static analysis of content associated with the sample, wherein performing the static analysis includes using at least one stored IUPG model; and determining that the sample is malicious based at least in part on the static analysis of the content associated with the sample, and in response to determining that the sample is malicious, performing an action based on a security policy.
    Type: Application
    Filed: May 26, 2021
    Publication date: December 9, 2021
    Inventors: Brody James Kutt, Oleksii Starov, Yuchen Zhou, William Redington Hewlett, II
  • Publication number: 20210350822
    Abstract: A system automatically controls an electronic device's audio by detecting an active sound source presence within an auditory detection space. The system transitions the electronic device to selectively output a desired sound when the active sound source presence is detected and detects sound in the auditory detection space. The system enhances sound and transforms it into electrical signals. The system converts the electrical signals into a digital signal and identifies active sound segments in the digital signals. The system attenuates noise components in the digital signals and locates the physical location of the active sound source. It adjusts an output automatically by muting a second sound source in a second detection space.
    Type: Application
    Filed: November 30, 2020
    Publication date: November 11, 2021
    Inventors: Wei Liu, Jin Guo, Sally Tung, Yuchen Zhou, Jinxin Dong
  • Publication number: 20210294424
    Abstract: A system automatically frames locations by detecting a user's presence within a virtual detection space. The system detects sound in the detection space and converts the sound into electrical signals. The electrical signals are converted into a digital signals at common or periodic sampling rates. The system identifies speech segments in the digital signals and attenuates noise like components within or adjacent to them. The system identifies the physical locations of a speech source generating the speech segments and automatically adjusts a camera framing based on the estimated location of the active speech source generating the speech segments.
    Type: Application
    Filed: August 24, 2020
    Publication date: September 23, 2021
    Inventors: Jinxin Dong, Sally Tung, Yuchen Zhou, Wei Liu, Jin Guo
  • Publication number: 20210240825
    Abstract: Techniques for multi-representational learning models for static analysis of source code are disclosed. In some embodiments, a system/process/computer program product for multi-representational learning models for static analysis of source code includes storing on a networked device a set comprising one or more multi-representation learning (MRL) models for static analysis of source code; performing a static analysis of source code associated with a sample received at the network device, wherein performing the static analysis includes using at least one stored MRL model; and determining that the sample is malicious based at least in part on the static analysis of the source code associated with the received sample, and in response to determining that the sample is malicious, perform an action based on a security policy.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Inventors: Brody James Kutt, William Redington Hewlett, II, Oleksii Starov, Yuchen Zhou, Fang Liu
  • Publication number: 20210240826
    Abstract: Techniques for building multi-representational learning models for static analysis of source code are disclosed. In some embodiments, a system/process/computer program product for building multi-representational learning models for static analysis of source code includes receiving training data, wherein the training data includes a set of source code files for training a multi-representational learning (MRL) model for classifying malicious source code and benign source code based on a static analysis; generating a first feature vector based on a set of characters extracted from the set of source code files; generating a second feature vector based on a set of tokens extracted from the set of source code files; and performing an ensemble of the first feature vector and the second feature vector to form a target feature vector for classifying malicious source code and benign source code based on the static analysis.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Inventors: Brody James Kutt, William Redington Hewlett, II, Oleksii Starov, Yuchen Zhou, Fang Liu
  • Publication number: 20210227203
    Abstract: The current invention describes methods, techniques, devices, and apparatuses for graphics and display processing for virtual and augmented reality. In some examples, this disclosure describes a projection display system capable of rendering and displaying multiple virtual objects or virtual objects utilizing an estimated distance between a real world object and a user and adjusting a focus depth of said display system. In some examples, this disclosure proposes techniques for rendering and displaying multiple virtual objects or virtual objects at the same time at multiple different distances to a user.
    Type: Application
    Filed: April 6, 2021
    Publication date: July 22, 2021
    Inventor: Yuchen Zhou
  • Publication number: 20210176233
    Abstract: An author of a malicious websites campaign (scam or phishing) likely uses a legitimate third-party service to facilitate the malicious campaign. An example includes legitimate CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) services to conceal the malicious campaign from automated security scanners. A security service/platform can employ a detection pipeline that leverages use of CAPTCHA keys across websites of a malicious websites campaign. Websites that use CAPTCHA keys found in known malicious websites can at least be identified as suspect and communicated to firewalls.
    Type: Application
    Filed: February 22, 2021
    Publication date: June 10, 2021
    Inventors: Oleksii Starov, Yuchen Zhou, Xiao Zhang, Fang Liu
  • Patent number: 11006102
    Abstract: The current invention relates to the methods to achieve virtual reality with making virtual objects not under focus of a viewer in virtual scenes appear defocused, and making objects under focus of said viewer appearing focused and clear to said viewer. The current invention also relates to the methods to achieve augmented reality with making virtual objects in virtual scenes associated with real objects not under focus of a viewer in real scenes appear defocused to said viewer in said virtual scene, and making virtual objects in virtual scenes associated with real objects being under focus of a viewer in real scenes appear focused to said viewer in said virtual scene.
    Type: Grant
    Filed: June 6, 2019
    Date of Patent: May 11, 2021
    Inventor: Yuchen Zhou
  • Publication number: 20210120034
    Abstract: Web sites are crawled using multiple browser profiles to avoid malicious cloaking. Based on web page content returned from HTTP requests using the multiple browser profiles, web sites returning substantively different content to HTTP requests for different browser profiles are identified. Web sites are further filtered by common cloaking behavior, and redirect scripts are extracted from web page content that performed cloaking. Signatures comprising tokenized versions of the redirect scripts are generated and compared to a database of known cloaking signatures. URLs corresponding to signatures having approximate matches with signatures in the database are flagged for recrawling. Recrawled URLs are verified for malicious cloaking again using HTTP requests from multiple browser profiles.
    Type: Application
    Filed: October 22, 2019
    Publication date: April 22, 2021
    Inventors: Oleksii Starov, Zhanhao Chen, Yuchen Zhou, Fang Liu
  • Publication number: 20210075800
    Abstract: Presented herein are intrusion detection systems and algorithms for networked vehicle controllers and devices, methods for making/using such systems and algorithms, and motor vehicles with a network of ECUs and network-profiling intrusion detection capabilities. A method for detecting intrusions into an onboard network of vehicle controllers includes determining the current state of operation of a vehicle, and identifying a network traffic pattern table corresponding to the vehicle's current state of operation. Network traffic flow for one of the in-vehicle controllers is monitored when exchanging data over the Ethernet communication interface while the motor vehicle is operating in the current state of operation. The method then determines if a traffic characteristic of the monitored network traffic flow is outside a calibrated boundary that is determined from the network traffic pattern table.
    Type: Application
    Filed: December 15, 2017
    Publication date: March 11, 2021
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Evripidis Paraskevas, Yuchen Zhou, Unmesh Dutta Bordoloi, Massimo Osella, Michael E. Potts
  • Patent number: 10931688
    Abstract: The technology presented herein enables malicious websites to be discovered based on web analytics identifiers associated therewith. In a particular embodiment, a method provides obtaining information about one or more first websites that are known to be malicious. The method further provides identifying one or more first analytics identifiers that are each associated with at least one of the first websites and identifying one or more second websites that are each associated with at least one of the first analytics identifiers.
    Type: Grant
    Filed: July 20, 2018
    Date of Patent: February 23, 2021
    Assignee: PALO ALTO NETWORKS, INC.
    Inventors: Oleksii Starov, Yuchen Zhou, Xiao Zhang, Fang Liu
  • Patent number: 10727400
    Abstract: The present invention is directed to a magnetic memory element including a magnetic free layer structure having a variable magnetization direction perpendicular to a layer plane thereof; a non-magnetic metal layer formed adjacent to the magnetic free layer structure; an oxide layer formed adjacent to the non-magnetic metal layer; an insulating tunnel junction layer formed adjacent to the magnetic free layer structure opposite the non-magnetic metal layer; a first magnetic reference layer formed adjacent to the insulating tunnel junction layer; a second magnetic reference layer separated from the first magnetic reference layer by a perpendicular enhancement layer; an antiferromagnetic coupling layer formed adjacent to the second magnetic reference layer; and a magnetic fixed layer structure formed adjacent to the antiferromagnetic coupling layer. The first and second magnetic reference layers have a first invariable magnetization direction substantially perpendicular to layer planes thereof.
    Type: Grant
    Filed: August 24, 2018
    Date of Patent: July 28, 2020
    Assignee: Avalanche Technology, Inc.
    Inventors: Zihui Wang, Yiming Huai, Huadong Gan, Yuchen Zhou
  • Patent number: RE47975
    Abstract: An STTMRAM element includes a magnetic tunnel junction (MTJ) having a perpendicular magnetic orientation. The MTJ includes a barrier layer, a free layer formed on top of the barrier layer and having a magnetic orientation that is perpendicular and switchable relative to the magnetic orientation of the fixed layer. The magnetic orientation of the free layer switches when electrical current flows through the STTMRAM element. A switching-enhancing layer (SEL), separated from the free layer by a spacer layer, is formed on top of the free layer and has an in-plane magnetic orientation and generates magneto-static fields onto the free layer, causing the magnetic moments of the outer edges of the free layer to tilt with an in-plane component while minimally disturbing the magnetic moment at the center of the free layer to ease the switching of the free layer and to reduce the threshold voltage/current.
    Type: Grant
    Filed: August 10, 2018
    Date of Patent: May 5, 2020
    Assignee: Avalanche Technology, Inc.
    Inventors: Jing Zhang, Yiming Huai, Rajiv Yadav Ranjan, Yuchen Zhou, Zihui Wang, Xiaojie Hao