Patents by Inventor Yun Shen

Yun Shen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180196192
    Abstract: A method for manufacturing high frequency signal transmission structure comprises: providing two dielectric layers, each of the two dielectric layers defining a top surface and a bottom surface and comprising a channel with a bottom open end opened at the top surface and a top open end opened at the bottom surface, an inner diameter of the each of the two channels gradually reducing further from the top open end to the bottom open end; providing a circuit layer with a transmission portion; providing two copper plates; combining the circuit layer, the two dielectric layers and the two copper plates to form a combination; providing a shielding layer around the two air chambers; and providing at least one solder mask covering the shielding layer. The present disclosure also provides a high frequency signal transmission structure obtained by the method.
    Type: Application
    Filed: July 19, 2017
    Publication date: July 12, 2018
    Inventors: XIAN-QIN HU, FU-YUN SHEN, MING-JAAN HO, FENG-YUAN HU
  • Patent number: 10012454
    Abstract: A heat dissipation device includes a first copper sheet and a second copper sheet. The first copper sheet includes a number of first recesses and the second copper sheet includes a number of corresponding second recesses. The second copper sheet is fixed on the first copper sheet and an airtight receiving cavity is formed by each first recess and each the second recess, a working fluid in the airtight receiving cavity carries unwanted heat away.
    Type: Grant
    Filed: April 20, 2015
    Date of Patent: July 3, 2018
    Assignees: Avary Holding (Shenzhen) Co., Limited., GARUDA TECHNOLOGY CO., LTD
    Inventors: Xian-Qin Hu, Fu-Yun Shen, Ming-Jaan Ho
  • Publication number: 20180091313
    Abstract: A computer system including a processor and a memory is provided. The processor includes a microcode executing unit and a programmable fuse which stores trusted information which is pre-generated using China commercial cryptography algorithms. The memory is operatively coupled to the processor and is configured to store a trusted module and a digital certificate of the trusted module. The microcode executing unit uses the China commercial cryptography algorithms to authenticate the digital certificate according to the trusted information, and authenticates the trusted module according to the authenticated digital certificate.
    Type: Application
    Filed: November 10, 2016
    Publication date: March 29, 2018
    Inventors: Kai LI, Yun SHEN, Hui LI
  • Publication number: 20180091314
    Abstract: A computer system including a processor and a memory is provided. The memory is operatively coupled to the processor and is configured to store a trusted module and a digital certificate of the trusted module. The processor authenticates a digital signature of the digital certificate, and when the digital signature is successfully authenticated, authenticates the trusted module according to the first hash value of the trusted module, which is stored in the first extension field of the digital certificate.
    Type: Application
    Filed: November 10, 2016
    Publication date: March 29, 2018
    Inventors: Kai LI, Yun SHEN, Hui LI
  • Publication number: 20180082924
    Abstract: A heat dissipation structure comprises a flexible substrate, a graphite sheet, and a heat insulating material. The flexible substrate comprises a first surface and a second surface facing away from the first surface. The graphite sheet is connected to the second surface. At least one containing cavity is defined on an interface between the second surface and the graphite sheet. The heat insulating material is filled in the at least one containing cavity to form a heat insulating structure.
    Type: Application
    Filed: June 6, 2017
    Publication date: March 22, 2018
    Inventors: FU-YUN SHEN, CONG LEI, MING-JAAN HO, HSIAO-TING HSU
  • Patent number: 9898615
    Abstract: A processor-based method to defeat file and process hiding techniques in a computing device is provided. The method includes generating one of a path permutation, a symlink, or an address, for a path to open or obtain status of a tool or function in a library in a mobile computing device and making an open or status call for the tool or function, using the one of the path permutation, symlink or address. The method includes avoiding a pattern match and blocking, by an injected library, of the open or status call, the avoiding being a result of making the open or status call using the path permutation, symlink or address.
    Type: Grant
    Filed: August 20, 2015
    Date of Patent: February 20, 2018
    Assignee: SYMANTEC CORPORATION
    Inventors: Nathan Evans, Azzedine Benameur, Yun Shen
  • Patent number: 9898272
    Abstract: The present disclosure relates to systems and methods based at least in part on managing electronic device configuration and/or features. In some embodiments, a method may include identifying a first configuration state at a first time; generating a virtual configuration state based at least in part on the first configuration state at the first time; determining a first modification to be made to the first configuration state based at least in part on a first characteristic of a first application; modifying the virtual configuration state based at least in part on the determined first modification; and/or modifying the first configuration state at a second time after the first time based at least in part on the determined first modification.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: February 20, 2018
    Assignee: Symantec Corporation
    Inventors: Azzedine Benameur, Nathan Evans, Yun Shen
  • Patent number: 9895400
    Abstract: A use of a Lactobacillus reuteri GMNL-263 in decreasing blood lipid levels is disclosed. Lactobacillus reuteri GMNL-263 (accession No.: CCTCC M 209263) specifically inhibits gene expression related to pro-inflammatory factor and lipid synthesis and promotes gene expression related to cholesterol metabolism. Lactobacillus reuteri GMNL-263 is utilized to produce a composition for decreasing blood lipid levels, thereby achieving the aim of hyperlipidemia treatment.
    Type: Grant
    Filed: February 10, 2015
    Date of Patent: February 20, 2018
    Assignee: Genmont Biotech Inc.
    Inventors: Yi-Hsing Chen, Ya-Hui Chen, Tzu-Chi Lou, Ting-Yun Shen
  • Patent number: 9843594
    Abstract: The disclosed computer-implemented method for detecting anomalous messages in automobile networks may include (1) receiving automobile-network messages that are expected to be broadcast over an automobile network of an automobile, (2) extracting a set of features from the automobile-network messages, and (3) using the set of features to create a model that is capable of distinguishing expected automobile-network messages from anomalous automobile-network messages. The disclosed computer-implemented method may further include (1) detecting an automobile-network message that has been broadcast over the automobile network, (2) using the model to determine that the automobile-network message is anomalous, and (3) performing a security action in response to determining that the automobile-network message is anomalous. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 28, 2014
    Date of Patent: December 12, 2017
    Assignee: Symantec Corporation
    Inventors: Nathan Evans, Azzedine Benameur, Yun Shen
  • Patent number: 9762711
    Abstract: An ejecting mechanism provides an ejecting executing portion driven by an ejecting driving portion for pushing a secondary machine out of a primary machine and for separating a secondary connector and a primary connector connected to each other. It allows the secondary machine to be ejected out of the primary machine automatically and prevents damage of the secondary connector and the primary connector caused by applying an external pulling force on the secondary machine directly. Furthermore, when a first external force overcomes a resilient driving force to push the secondary machine into a slot, the ejecting executing portion contacting with the secondary machine swings toward a rear end of a connecting surface of the primary connector. Additionally, an ejecting locking portion moving with the swing of the ejecting executing portion can be locked by a locking executing portion, such that the automatic ejection of the secondary machine is restrained.
    Type: Grant
    Filed: June 10, 2015
    Date of Patent: September 12, 2017
    Assignee: QISDA (SUZHOU) CO., Ltd.
    Inventors: Shun Cai He, Li Bing Chen, Hai Dong Wang, Qi Yun Shen, Xiao Jun Xu, Chun Yang Chen
  • Publication number: 20170188451
    Abstract: A flexible circuit board includes a first circuit substrate, a second circuit substrate and a bonding layer. The first circuit substrate includes a first base layer, a first circuit layer, a second circuit layer and metal coating layer. The first circuit layer includes a signal line and at least two grounding lines. The metal coating layer encloses the signal line. The second circuit substrate includes a third circuit layer. The bonding layer is located between and bonding the first circuit substrate and the second circuit substrate. The second circuit layer, the third circuit layer are electrically coupled with the grounding lines by a plurality of electrically conductive holes. The first base layer, the bonding layer and the second circuit substrate cooperatively enclose a hermetic medium layer receiving the signal line. The hermitic medium layer is filled with air. A method for manufacturing the flexible circuit board is also provided.
    Type: Application
    Filed: March 23, 2016
    Publication date: June 29, 2017
    Inventors: XIAN-QIN HU, FU-YUN SHEN, MING-JAAN HO, YI-QIANG ZHUANG
  • Publication number: 20170180418
    Abstract: A system and method for detecting malicious hijack events in real-time is provided. The method may include receiving routing data associated with a Border Gateway Protocol (BGP) event from at least one BGP router. The method may further include processing the routing data to generate a list of features representing ownership and various other details relating to origin and upstream equipment. The method may further include generating a hijack detection model using the routing data and the list of features, where a machine learning technique, such as Positive Unlabeled learning technique is employed. The machine learning technique may include at least one data input and a probability output; wherein, the data input couples to receive a set of historically confirmed BGP hijacking data and the routing data, while the probability output transmits a probability value for the malicious event which may be calculated based upon the data input.
    Type: Application
    Filed: December 21, 2015
    Publication date: June 22, 2017
    Inventors: Yun Shen, Yufei Han, Pierre-Antoine Vervier
  • Publication number: 20170161483
    Abstract: Code upgrades for computer components. After being powered on, a central processing unit (CPU) of a computer system loads a start-up authenticated code module (start-up ACM) to an authenticated code execution area (ACEA) within the CPU to be authenticated. When the start-up ACM passes authentication, the CPU executes the start-up ACM to connect to a server and receive a code upgrade file for a computer component of the computer system from the server.
    Type: Application
    Filed: April 29, 2016
    Publication date: June 8, 2017
    Inventors: Kai LI, Yun SHEN
  • Publication number: 20170124337
    Abstract: A chipset and a host controller, including a storage host controller for a storage device and an encryption and decryption engine that is implemented by hardware. The storage host controller analyzes a write command to obtain write command information, and provides the write command information and write data to the encryption and decryption engine. The encryption and decryption engine combines a data drive key with the write command information to encrypt the write data and provides the encrypted write data to the storage host controller to be written into a storage device via a communication port.
    Type: Application
    Filed: April 11, 2016
    Publication date: May 4, 2017
    Inventors: Kai LI, Gangru XUE, Yun SHEN, Hui LI
  • Publication number: 20170110244
    Abstract: A circuit board for radio transceiving includes a flexible base and an inductance unit. The flexible base has a first conductive hole. The inductance unit includes a first inductance coil located at a first side of the flexible base and a second inductance coil located at an opposite side of the flexible base from the first inductance coil. The first inductance coil surrounds the first conductive hole and extends in a spiral direction and turn-by-turn into the first conductive hole. The second inductance coil surrounds the first conductive hole and extends in a spiral direction and turn-by-turn out from the first conductive hole. The first inductance coil and the second inductance coil are electrically connected with each other via the first conductive hole through the flexible base.
    Type: Application
    Filed: October 30, 2015
    Publication date: April 20, 2017
    Inventors: XIAN-QIN HU, FU-YUN SHEN, MING-JAAN HO, YI-QIANG ZHUANG
  • Patent number: 9628506
    Abstract: A computer-implemented method for detecting security events may include (1) identifying facets of candidate security events detected by a network security system, (2) assigning each of the facets of the candidate security events to one of multiple groups of facets to create permutations of the facets, (3) comparing, for each group of facets, the candidate security events according to a similarity algorithm that indicates similarity between the candidate security events, (4) generating, for each group of facets, a weak classifier for detecting security events based on a nearest neighbor graph, and (5) performing, by the network security system, a remedial action in response to classifying a candidate security event as a security threat by applying a combination of the weak classifiers for the groups of facets to the candidate security event. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: April 18, 2017
    Assignee: Symantec Corporation
    Inventors: Yufei Han, Yun Shen
  • Patent number: 9615445
    Abstract: A flexible circuit board includes two copper clad laminates, a circuit pattern and two bonding layers. Each copper clad laminate includes an insulating base and an outer circuit layer. The circuit pattern is located between the two copper clad laminates. The circuit pattern includes a linear signal line, two grounding lines located at two opposite sides of the linear signal line, and two hollow areas located between the linear signal line and the grounding lines. Each bonding layers is located between the circuit pattern and a corresponding copper clad laminate. Each boding layer defines a slot without adhesive therein. The bonding layers are spaced from the linear signal line by the slots. The slots and the hollow areas cooperatively define an air medium layer enclosing the linear signal line. A method for manufacturing the flexible circuit board is also provided.
    Type: Grant
    Filed: September 18, 2015
    Date of Patent: April 4, 2017
    Assignees: FuKui Precision Component (Shenzhen) Co., Ltd., GARUDA TECHNOLOGY CO., LTD., HongQiSheng Precision Electronics (QinHuangDao) Co., Ltd.
    Inventors: Xian-Qin Hu, Fu-Yun Shen, Ming-Jaan Ho, Yi-Qiang Zhuang
  • Publication number: 20170092948
    Abstract: A positive electroactive material for a lithium-ion battery can have a tap density ranging from 2.50 to 2.90 g/cm3, a Span value ranging from 1.04 to 1.68 and/or a capacity ranging from 195 to 210 mAh/g obtained using a discharging current of C/5 current rate. The material can have a formula Lia[NixMnyCo1-x-y]zM1-zO2, wherein a is between approximately 1.02 and 1.07, x is between approximately 0.60 to 0.82, y is between approximately 0.09 to 0.20, z is between approximately 0.95 to 1.0, and 1?x?y is greater than 0. A cost-effective and large-scale synthetic method for preparing the positive electroactive material, an electrochemical cell containing the positive electroactive material, and a battery comprising one or more lithium ion electrochemical cells are also described.
    Type: Application
    Filed: September 20, 2016
    Publication date: March 30, 2017
    Inventors: DONG REN, YUN SHEN, YINGCHAO YU
  • Patent number: 9582669
    Abstract: The disclosed computer-implemented method for detecting discrepancies in automobile-network data may include (1) receiving data that indicates at least one attribute of an automobile and that was conveyed via an automobile-network message that was purportedly broadcast over an automobile network of the automobile, (2) receiving additional data that indicates the same attribute of the automobile and that was not conveyed via any automobile-network message that was broadcast over the automobile network, (3) detecting a discrepancy between the data and the additional data, and (4) performing a security action in response to detecting the discrepancy between the data and the additional data. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 28, 2014
    Date of Patent: February 28, 2017
    Assignee: Symantec Corporation
    Inventors: Yun Shen, Nathan Evans, Azzedine Benameur
  • Patent number: 9571510
    Abstract: The disclosed computer-implemented method for identifying security threat sources responsible for security events may include (1) identifying security-event data collected from a plurality of security events detected over a network, (2) partitioning the security-event data into a set of single-dimensional security clusters, each grouped by a common feature, (3) determining that a subset of the single-dimensional security clusters exceed a threshold level of similarity relative to one another, (4) grouping the subset of single-dimensional clusters into a multi-dimensional security cluster corresponding to a single threat source in response to determining that the subset of single-dimensional clusters exceed the threshold level of similarity relative to one another, and then (5) determining, based at least in part on grouping the single-dimensional clusters into the multi-dimensional cluster, that the single threat source is likely responsible for some of the security events.
    Type: Grant
    Filed: October 21, 2014
    Date of Patent: February 14, 2017
    Assignee: Symantec Corporation
    Inventors: Yun Shen, Olivier Thonnard