Patents by Inventor Yun Shen

Yun Shen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190138909
    Abstract: A method for encoding and storing text information using DNA as a storage medium, a decoding method therefor and an application thereof. The method for using DNA to store text information comprises: encoding characters into computer binary digits by means of encoding, and converting the binary digits into DNA sequences by means of transcoding; and artificially synthesizing the DNA sequences encoded with character information, positioning the characters by means of a designed ligation adapter, and assembling the DNA sequences encoded with the character information according to a pre-set order. The method for using DNA to store text information has the advantages of a small storage volume, a large storage capacity, a strong stability and low maintenance costs.
    Type: Application
    Filed: May 4, 2016
    Publication date: May 9, 2019
    Inventors: Yue SHEN, Tai CHEN, Longying LIU, Shihong CHEN, Yun WANG, Huanming YANG
  • Patent number: 10277621
    Abstract: The disclosed computer-implemented method for detecting vulnerabilities on servers may include (i) sending requests to servers for information about services potentially executing on the servers, (ii) receiving, in response to requests, messages from the servers that comprise the information about the services, wherein the set of messages use different formats for transmitting the information, (iii) creating, by analyzing the set of the messages, at least one heuristic that is capable of automatically extracting, from a message, an identifier of a service that executes on a server that sent the message, (iv) extracting, from the message, via the heuristic, the identifier of the service executes on the server that sent the message, and (v) determining, based on the identifier of the service, that the service contributes to a vulnerability on the server that sent the message. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: April 30, 2019
    Assignee: Symantec Corporation
    Inventors: Pierre-Antoine Vervier, Yun Shen
  • Patent number: 10278074
    Abstract: The disclosed computer-implemented method for categorizing mobile devices as rooted may include (1) gathering a set of metadata describing a plurality of rooted mobile devices that have been modified to allow a user to alter protected systems and an additional set of metadata describing a plurality of unrooted mobile devices that have not been modified to allow the user to alter the protected systems, (2) comparing the set of metadata with the additional set of metadata to determine at least one feature that differentiates the rooted mobile devices from the unrooted mobile devices, (3) determining whether the feature is present in metadata that describes an uncategorized mobile device, and (4) categorizing the uncategorized mobile device as a rooted mobile device based on the presence of the feature in the metadata that describes the uncategorized mobile device. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 22, 2015
    Date of Patent: April 30, 2019
    Assignee: Symantec Corporation
    Inventors: Yun Shen, Azzedine Benameur, Nathan Evans
  • Patent number: 10278307
    Abstract: A cooling plate of a first embodiment of the present disclosure is configured with a electronic device for heat dissipation. The cooling plate of the first embodiment disclosure includes a first plate, a second plate opposite to the first plate, a bonding line connected with the first plate and the second plate, a plurality of supporting columns, and a cooling liquid received between the first plate and the second plate. The first plate, the second plate, and the bonding line together define a cavity, the plurality of supporting columns and the cooling liquid are received in the cavity. The plurality of supporting columns connects perpendicularly with the first plate and the second plate. The cooling liquid communicates between the plurality of the supporting columns.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: April 30, 2019
    Assignees: Avary Holding (Shenzhen) Co., Limited, HongQiSheng Precision Electronics (QinHuangDao) Co., Ltd.
    Inventors: Xian-Qin Hu, Fu-Yun Shen, Ming-Jaan Ho, Hsiao-Ting Hsu
  • Patent number: 10243963
    Abstract: The disclosed computer-implemented method for generating device-specific security policies for applications may include (1) installing, onto a computing device, an application requested by the computing device, (2) while the application is running on the computing device, monitoring interactions between the application and a computing environment in which the computing device operates to identify (A) computing resources within the computing environment required by the application and (B) potential security concerns related to the application within the computing environment, and then (3) generating, based on the monitored interactions, a set of device-specific security policies to enforce for the application while the application runs on the computing device that allow the application to access the required computing resources while mitigating the potential security concerns. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: March 26, 2019
    Assignee: Symantec Corporation
    Inventors: Azzedine Benameur, Nathan Evans, Yun Shen
  • Publication number: 20190081322
    Abstract: The present invention generally relates to materials for electrochemical cells, e.g., for use in batteries such as lithi- um-ion batteries, and other applications. For example, certain embodiments of the present invention provide a positive electroac- tive material, which may have a core-shell structure. The material, in certain embodiments, has the formula (Li1+a[NiqMrCo1-q-r] O2)x.(Li1?a[NisMntCO1-s-t]O2)1-x, where M may be Mn and/or Al. In some cases, the first portion may represent the core, while the second portion may represent the shell in a core-shell particle. In certain embodiments, x is a numerical value inclusively ranging from 0.70 to 0.95, a is a numerical value inclusively ranging from 0.01 to 0.0 7, q is a numerical value inclusively ranging from 0.80 to 0.96, r is a numerical value inclusively ranging from 0.01 to 0.10, s is a numerical value inclusively ranging from 0.34 to 0.70, t is a numerical IN value inclusively ranging from 0.20 to 0.40.
    Type: Application
    Filed: February 21, 2018
    Publication date: March 14, 2019
    Applicant: Lionano Inc.
    Inventors: Dong Ren, Yun Shen, Yingchao Yu
  • Patent number: 10225284
    Abstract: Techniques of obfuscation for enterprise data center services are disclosed. In one embodiment, the techniques may be realized as a system for obfuscation comprising one or more processors. The one or more processors may be configured to receive a command from at least one of a user and an application and determine whether the command is authorized. If the command is determined to be unauthorized, the one or more processors may be further configured to generate a rewritten output of the command that is different from an original output of the command and return the rewritten output in response to the command.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: March 5, 2019
    Assignee: SYMANTEC CORPORATION
    Inventors: Nathan S. Evans, Azzedine Benameur, Yun Shen
  • Publication number: 20190059174
    Abstract: A cooling plate of a first embodiment of the present disclosure is configured with a electronic device for heat dissipation. The cooling plate of the first embodiment disclosure includes a first plate, a second plate opposite to the first plate, a bonding line connected with the first plate and the second plate, a plurality of supporting columns, and a cooling liquid received between the first plate and the second plate. The first plate, the second plate, and the bonding line together define a cavity, the plurality of supporting columns and the cooling liquid are received in the cavity. The plurality of supporting columns connects perpendicularly with the first plate and the second plate. The cooling liquid communicates between the plurality of the supporting columns.
    Type: Application
    Filed: November 27, 2017
    Publication date: February 21, 2019
    Inventors: XIAN-QIN HU, FU-YUN SHEN, MING-JAAN HO, HSIAO-TING HSU
  • Publication number: 20190051939
    Abstract: The present invention generally relates to poly(lithium acrylate) (PLA) and other materials, which may be used in polymer blend membranes and other applications. Certain embodiments, for example, relate to methods of preparing poly(lithium acrylate), or membranes comprising poly(lithium acrylate). In some embodiments, lithium acrylate monomer may be obtained through neutralization reaction between a strong inorganic base and a weak organic acid. Such materials can be used in electrochemical cells, for example, as a membrane, e.g., for use in batteries such as lithium-ion batteries, or other applications. In certain cases, the molecular weight of the PLA may be between 102 Da to 106 Da. In some embodiments, the membrane may have a mechanical strength of elastic stress modulus between 5 kPa to 500 MPa with strain from 0% to 200%. In some embodiments, the membrane may have an ionic conductivity between 10?9 S cm?1 to 10?3 S cm?1.
    Type: Application
    Filed: August 9, 2018
    Publication date: February 14, 2019
    Applicant: Lionano Inc.
    Inventors: Peishen Huang, Minghui Li, Yun Shen, Yingchao Yu
  • Patent number: 10205487
    Abstract: A wireless power consortium device includes a flexible substrate layer, at least one first WPC coil on the flexible substrate layer, at least one first NFC coil on the flexible substrate layer, at least one WPC module, and at least one NFC module. Each WPC module comprises a first matching circuit and a WPC power supply chip electrically connected to the first matching circuit. Each NFC module comprises a second matching circuit and an NFC controlling chip electrically connected to the second matching circuit. The first matching circuit and the second matching circuit are different parts of one circuit and are formed on the flexible substrate layer.
    Type: Grant
    Filed: January 13, 2018
    Date of Patent: February 12, 2019
    Assignees: Avary Holding (Shenzhen) Co., Limited., HongQiSheng Precision Electronics (QinHuangDao) Co
    Inventors: Ming-Jaan Ho, Xian-Qin Hu, Fu-Yun Shen
  • Patent number: 10185838
    Abstract: A processor-based method to defeat file and process hiding techniques in a computing device is provided. The method includes generating one of a path permutation, a symlink, or an address, for a path to open or obtain status of a tool or function in a library in a mobile computing device and making an open or status call for the tool or function, using the one of the path permutation, symlink or address. The method includes avoiding a pattern match and blocking, by an injected library, of the open or status call, the avoiding being a result of making the open or status call using the path permutation, symlink or address.
    Type: Grant
    Filed: February 20, 2018
    Date of Patent: January 22, 2019
    Assignee: SYMANTEC CORPORATION
    Inventors: Nathan Evans, Azzedine Benameur, Yun Shen
  • Publication number: 20190020674
    Abstract: The disclosed computer-implemented method for detecting vulnerabilities on servers may include (i) sending requests to servers for information about services potentially executing on the servers, (ii) receiving, in response to requests, messages from the servers that comprise the information about the services, wherein the set of messages use different formats for transmitting the information, (iii) creating, by analyzing the set of the messages, at least one heuristic that is capable of automatically extracting, from a message, an identifier of a service that executes on a server that sent the message, (iv) extracting, from the message, via the heuristic, the identifier of the service executes on the server that sent the message, and (v) determining, based on the identifier of the service, that the service contributes to a vulnerability on the server that sent the message. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: July 12, 2017
    Publication date: January 17, 2019
    Inventors: Pierre-Antoine Vervier, Yun Shen
  • Publication number: 20190020033
    Abstract: The present invention generally relates to materials for electrochemical cells, e.g., for use in batteries such as lithium-ion batteries, and other applications. For example, certain embodiments of the present invention provide a composition for a slurry or a slurry for the manufacture of an electrode for an electrochemical cell. The slurry, in certain embodiments, comprises a combination of ionomer, binder, conducting additive, electroactive materials, and water. The ionomer, in some embodiments, includes a polymer backbone, one or more anionic substituents (which may be in the backbone and/or in one or more pendant groups), and one or more cations.
    Type: Application
    Filed: July 17, 2018
    Publication date: January 17, 2019
    Applicant: Lionano Inc.
    Inventors: Minghui Li, Peishen Huang, Yun Shen, Yingchao Yu
  • Publication number: 20180375894
    Abstract: The disclosed computer-implemented method for mapping Internet Protocol addresses for an organization may include (1) receiving information for an organization from an organizational server, (2) extracting data from a plurality of server data sources associated with the information, (3) mapping the data from the plurality of sever data sources to the information, and (4) determining, based at least in part on the mapped data, a list of IP addresses identifying one or more relationships associated with the organization thereby facilitating performing a security posture analysis against a malicious attack. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: June 22, 2017
    Publication date: December 27, 2018
    Inventors: Pierre-Antoine Vervier, Yun Shen
  • Patent number: 10148690
    Abstract: A system and method for detecting malicious hijack events in real-time is provided. The method may include receiving routing data associated with a Border Gateway Protocol (BGP) event from at least one BGP router. The method may further include generating a hijack detection model using a machine learning technique, such as Positive Unlabeled learning. The machine learning technique may include at least one data input and a probability output; wherein, the data input couples to receive a set of historically confirmed BGP hijacking data and the routing data, while the probability output transmits a probability value for the malicious event which may be calculated based upon the data input. Finally, the method may include classifying the BGP event as a malicious event or a benign event using the BGP hijack model and correcting routing tables that have been corrupted by a malicious event.
    Type: Grant
    Filed: December 21, 2015
    Date of Patent: December 4, 2018
    Assignee: SYMANTEC CORPORATION
    Inventors: Yun Shen, Yufei Han, Pierre-Antoine Vervier
  • Patent number: 10146893
    Abstract: A computer-implemented method for evaluating electronic control units within vehicle emulations may include (1) connecting an actual electronic control unit for a vehicle to a vehicle bus that emulates network traffic rather than actual network traffic generated by operation of the vehicle, (2) manipulating input to the actual electronic control unit to test how safely the actual electronic control unit and the emulated electronic control unit respond to the manipulated input, (3) detecting an output from the actual electronic control unit that indicates a response, from the actual electronic control unit, to manipulating the input, and (4) evaluating a safety level of at least one of the actual electronic control unit and the emulated electronic control unit based on detecting the output from the actual electronic control unit. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: December 4, 2018
    Assignee: Symantec Corporation
    Inventors: Nathan Evans, Azzedine Benameur, Yun Shen
  • Patent number: 10114947
    Abstract: The disclosed computer-implemented method for logging processes within containers may include (i) detecting creation of a new container that comprises a lightweight platform-independent filesystem capable of executing at least one process that is isolated from a host computing device that hosts the container, (ii) launching, within the new container, a monitoring process that maintains a log of events associated with a process that will be executing within the new container, (iii) recording to the log, by the monitoring process, data about at least one event associated with the process executing within the container, and (iv) exporting, by the monitoring process, the log to the host computing device that hosts the new container. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: October 30, 2018
    Assignee: Symantec Corporation
    Inventors: Azzedine Benameur, Nathan Evans, Yun Shen
  • Publication number: 20180310406
    Abstract: A method for making a circuit board comprising: providing a silver clad laminate comprising a substrate and two silver foils; forming at least one through hole on the silver clad laminate, the through hole comprises an annular middle wall and two annular edge walls connected to two sides of the annular middle wall; forming an organic conductive film on the annular middle wall; forming a dry film pattern layer on the second area; plating copper to form a copper circuit layer on the first area, and to form a via hole in the through hole; removing the dry film pattern layer; and etching the second area of the silver foil away. The first area changes to a silver circuit layer. The copper circuit layer and the silver circuit layer define a conductive circuit layer. A circuit board made by the method is also provided.
    Type: Application
    Filed: August 7, 2017
    Publication date: October 25, 2018
    Inventors: MING-JAAN HO, XIAN-QIN HU, FU-YUN SHEN, WEN-ZHU WEI
  • Patent number: 10104771
    Abstract: A method for making a circuit board comprising: providing a silver clad laminate comprising a substrate and two silver foils; forming at least one through hole on the silver clad laminate, the through hole comprises an annular middle wall and two annular edge walls connected to two sides of the annular middle wall; forming an organic conductive film on the annular middle wall; forming a dry film pattern layer on the second area; plating copper to form a copper circuit layer on the first area, and to form a via hole in the through hole; removing the dry film pattern layer; and etching the second area of the silver foil away. The first area changes to a silver circuit layer. The copper circuit layer and the silver circuit layer define a conductive circuit layer. A circuit board made by the method is also provided.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: October 16, 2018
    Assignees: Avary Holding (Shenzhen) Co., Limited., HongQiSheng Precision Electronics (QinHuangDao) Co
    Inventors: Ming-Jaan Ho, Xian-Qin Hu, Fu-Yun Shen, Wen-Zhu Wei
  • Patent number: 10095855
    Abstract: Code upgrades for computer components. After being powered on, a central processing unit (CPU) of a computer system loads a start-up authenticated code module (start-up ACM) to an authenticated code execution area (ACEA) within the CPU to be authenticated. When the start-up ACM passes authentication, the CPU executes the start-up ACM to connect to a server and receive a code upgrade file for a computer component of the computer system from the server.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: October 9, 2018
    Assignee: VIA ALLIANCE SEMICONDUCTOR CO., LTD.
    Inventors: Kai Li, Yun Shen