Patents by Inventor Fengmin Gong

Fengmin Gong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200252427
    Abstract: A device may include one or more memories; and one or more processors, communicatively coupled to the one or more memories, to receive a query for data stored by a database; generate an abstract syntax tree based on the query; determine whether the abstract syntax tree matches a list, where the list identifies one or more abstract syntax trees corresponding to queries or types of queries; and selectively perform an action based on whether the abstract syntax tree matches the entry of the list.
    Type: Application
    Filed: April 22, 2020
    Publication date: August 6, 2020
    Inventors: Frank Jas, Fengmin Gong
  • Publication number: 20200223395
    Abstract: Methods and systems for improving security of a vehicle are disclosed. In one embodiment, a method comprises receiving, from a requester, a request to access a vehicle compartment of a vehicle; determining a scope of access of the vehicle compartment for the requester based on an operation of the vehicle; and configuring a lock mechanism of the vehicle compartment based on the scope of access.
    Type: Application
    Filed: October 21, 2019
    Publication date: July 16, 2020
    Inventors: Jiang Zhang, Fengmin Gong, Xiaoyong Yi, Qi Chen, Yu Wang
  • Publication number: 20200223396
    Abstract: Disclosed are techniques for mutual authentication between a passenger that has requested a transportation service and a dispatched vehicle for providing the requested transportation service. A user device associated with the passenger verifies the dispatched vehicle using a vehicle access token generated by a transportation service platform and sends a secret key to the dispatched vehicle. The dispatched vehicle uses the secret key to recover passenger biometric information from a passenger secret received from the user device through the transportation service platform, captures passenger biometric information on-site, and compares the recovered passenger biometric information and the passenger biometric information collected on-site to verify the passenger.
    Type: Application
    Filed: October 25, 2019
    Publication date: July 16, 2020
    Inventors: Xiaoyong Yi, Fengmin Gong, Jiang Zhang, Qi Chen, Yu Wang
  • Publication number: 20200213299
    Abstract: Embodiments of the disclosure provide systems and methods for determining fingerprint information of a terminal device in a transportation service. An exemplary system may include a communication interface configured to establish a communication link between first and second terminal devices and receive user data from the first terminal device associated with a user of the transportation service. The communication interface may also be configured to receive authentication information authenticating the second terminal device. The system may also include a memory configured to store the user data and at least one processor coupled to the memory. The at least one processor is configured to determine a first fingerprint of the first terminal device based on the user data after receiving the authentication information authenticating the second terminal device.
    Type: Application
    Filed: December 31, 2018
    Publication date: July 2, 2020
    Applicant: DiDi Research America, LLC
    Inventors: Xiaoyong Yi, Yu Wang, Fengmin Gong
  • Publication number: 20200210678
    Abstract: Embodiments of the disclosure provide systems and methods for fraud detection in a transportation service. An exemplary system may include a communication interface configured to receive user data from a terminal device associated with a user providing the transportation service. The user data may include identification information of the terminal device. The system may also include a memory configured to store the user data. The system may also include at least one processor coupled to the memory. The processor may be configured to determine a first fingerprint based on the identification information. The processor may be further configured to determine whether the first fingerprint matches a first reference fingerprint associated with a registered terminal device. Moreover, the processor may be configured to generate a first notice when the first fingerprint does not match the first reference fingerprint.
    Type: Application
    Filed: December 31, 2018
    Publication date: July 2, 2020
    Applicant: DiDi Research America, LLC
    Inventors: Xiaoyong Yi, Yu Wang, Fengmin Gong
  • Publication number: 20200211301
    Abstract: Disclosed are techniques for securing electronic control units (ECUs) in a vehicle while allowing secure repairing of the ECUs. A method of repairing a vehicle includes disabling message authentication in secure communication between any two ECUs in a plurality of ECUs on the vehicle, detecting a first ECU that has been changed based on detecting an absence of a valid security key on the first ECU, verifying that a digital certificate associated with the first ECU is a valid certificate, generating one or more security keys for secure communication between the first ECU and a set of ECUs in the plurality of ECUs, provisioning the one or more security keys to the first ECU and the set of ECUs, and enabling the message authentication in secure communication between any two ECUs of the plurality of ECUs.
    Type: Application
    Filed: December 27, 2018
    Publication date: July 2, 2020
    Inventors: Jiang Zhang, Xiaoyong Yi, Qi Chen, Yu Wang, Fengmin Gong
  • Publication number: 20200213287
    Abstract: Disclosed are techniques for securing electronic control units (ECUs) in a vehicle. A security platform for a vehicle includes a key distribution center (KDC) for the vehicle. The KDC is configured to verify that a digital certificate associated with a first electronic control unit (ECU) on the vehicle is a valid certificate, where the digital certificate indicates a first security level of the first ECU. The KDC is configured to generate, based on the first security level of the first ECU, one or more security keys for secure communication between the first ECU and a set of ECUs on the vehicle, and provision the one or more security keys to the first ECU and the set of ECUs. In some embodiments, the KDC uses the provisioned keys to authenticate each ECU when the vehicle is powered up.
    Type: Application
    Filed: December 27, 2018
    Publication date: July 2, 2020
    Inventors: Jiang Zhang, Xiaoyong Yi, Qi Chen, Yu Wang, Fengmin Gong
  • Publication number: 20200213855
    Abstract: Embodiments of the disclosure provide systems and methods for fraud detecting in a transportation service. An exemplary method may include receiving user data from a terminal device associated with a user providing transportation service. The user data may include a location associated with the transportation service and positioning data of a geographical positioning system. The method may also include determining a first fingerprint based on the positioning data. The method may further include determining whether the first fingerprint matches a first reference fingerprint of a transmitter of the geographical position system corresponding to the location. Moreover, the method may include triggering a first fraud alert when the first fingerprint does not match the first reference fingerprint.
    Type: Application
    Filed: December 31, 2018
    Publication date: July 2, 2020
    Applicant: DiDi Research America, LLC
    Inventors: Xiaoyong Yi, Yu Wang, Fengmin Gong
  • Publication number: 20200160633
    Abstract: Aspects of the invention relate to a method for securing a vehicle compartment including receiving authorization data; setting a mode of operation of an access element based on the authorization data, the access element operable to control a locking mechanism of the vehicle compartment in a vehicle; receiving sensor data indicating that the vehicle compartment in the vehicle has been opened; and in response to the authorization data corresponding to the second mode of operation and the sensor data contemporaneously indicating that the vehicle compartment is opened: initiating a security protocol. The access element (e.g., user accessible button disposed in the vehicle cabin) can be configured to operate in a first mode of operation that allows the access element to control the locking mechanism and a second mode of operation that prevents the access element from controlling the locking mechanism.
    Type: Application
    Filed: November 15, 2018
    Publication date: May 21, 2020
    Inventors: Jiang Zhang, Fengmin Gong, Xiaoyong Yi, Qi Chen, Yu Wang
  • Patent number: 10637887
    Abstract: A device may include one or more memories; and one or more processors, communicatively coupled to the one or more memories, to receive a query for data stored by a database; generate an abstract syntax tree based on the query; determine whether the abstract syntax tree matches a list, where the list identifies one or more abstract syntax trees corresponding to queries or types of queries; and selectively perform an action based on whether the abstract syntax tree matches the entry of the list.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: April 28, 2020
    Assignee: Cyphort Inc.
    Inventors: Frank Jas, Fengmin Gong
  • Patent number: 10501055
    Abstract: Some embodiments include techniques for mutual authentication between a passenger that has requested a transportation service and a dispatched vehicle for providing the requested transportation service. A user device associated with the passenger verifies the dispatched vehicle using a vehicle access token generated by a transportation service platform and sends a secret key to the dispatched vehicle. The dispatched vehicle uses the secret key to recover passenger biometric information from a passenger secret received from the user device through the transportation service platform, captures passenger biometric information on-site, and compares the recovered passenger biometric information and the passenger biometric information collected on-site to verify the passenger.
    Type: Grant
    Filed: November 15, 2018
    Date of Patent: December 10, 2019
    Assignee: DiDi Research America, LLC
    Inventors: Xiaoyong Yi, Fengmin Gong, Jiang Zhang, Qi Chen, Yu Wang
  • Patent number: 10464529
    Abstract: Methods and systems for improving security of a vehicle are disclosed. In one embodiment, a method comprises receiving, from a requester, a request to access a vehicle compartment of a vehicle; determining a scope of access of the vehicle compartment for the requester based on an operation of the vehicle; and configuring a lock mechanism of the vehicle compartment based on the scope of access.
    Type: Grant
    Filed: November 15, 2018
    Date of Patent: November 5, 2019
    Assignee: Didi Research America, LLC
    Inventors: Jiang Zhang, Fengmin Gong, Xiaoyong Yi, Qi Chen, Yu Wang
  • Publication number: 20190332771
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Application
    Filed: July 10, 2019
    Publication date: October 31, 2019
    Inventors: Alexander BURT, Mikola BILOGORSKIY, McEnroe NAVARAJ, Frank JAS, Liang HAN, Yucheng TING, Manikandan KENYAN, Fengmin GONG, Ali GOLSHAN, Shishir SINGH
  • Publication number: 20190297097
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Application
    Filed: June 11, 2019
    Publication date: September 26, 2019
    Inventors: Fengmin Gong, Alexander Burt, Frank Jas
  • Patent number: 10354072
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Grant
    Filed: April 20, 2018
    Date of Patent: July 16, 2019
    Assignee: Cyphort Inc.
    Inventors: Alexander Burt, Mikola Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han, Yucheng Ting, Manikandan Kenyan, Fengmin Gong, Ali Golshan, Shishir Singh
  • Publication number: 20190207974
    Abstract: A device may include one or more memories; and one or more processors, communicatively coupled to the one or more memories, to receive a query for data stored by a database; generate an abstract syntax tree based on the query; determine whether the abstract syntax tree matches a list, where the list identifies one or more abstract syntax trees corresponding to queries or types of queries; and selectively perform an action based on whether the abstract syntax tree matches the entry of the list.
    Type: Application
    Filed: December 29, 2017
    Publication date: July 4, 2019
    Inventors: Frank JAS, Fengmin GONG
  • Patent number: 10326778
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Grant
    Filed: November 9, 2015
    Date of Patent: June 18, 2019
    Assignee: Cyphort Inc.
    Inventors: Fengmin Gong, Alexander Burt, Frank Jas
  • Patent number: 10225280
    Abstract: A system configured to detect malware is described. The system including an infection verification pack configured to perform behavior detonation; identify a malware object based on machine-learning; and select one or more persistent artifacts of the malware on the target system based on one or more algorithms applied to behavior traces of the malware object to select one or more persistent artifacts of the malware on the target system.
    Type: Grant
    Filed: February 23, 2015
    Date of Patent: March 5, 2019
    Assignee: Cyphort Inc.
    Inventors: Neal Vu, Frank Jas, Fengmin Gong, Anthony James, Ali Golshan, Shishir Singh
  • Patent number: 10095866
    Abstract: A system configured to generate a risk score for a threat activity including a digital device. The digital device configured to extract one or more threat events on a network based on metadata for one or more targeted digital devices on the network. Further, the digital device is configured to detect one or more incidents based on a correlation between at least a first threat event of the one or more threat events and a second threat event of the one or more threat events. And, the digital device is configured to generate a risk score for each of said one or more incidents.
    Type: Grant
    Filed: November 9, 2015
    Date of Patent: October 9, 2018
    Assignee: Cyphort Inc.
    Inventors: Fengmin Gong, Frank Jas, Druce MacFarlane
  • Publication number: 20180247058
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Application
    Filed: April 20, 2018
    Publication date: August 30, 2018
    Inventors: Alexander BURT, Mikola BILOGORSKIY, McEnroe NAVARAJ, Frank JAS, Liang HAN, Yucheng TING, Manikandan KENYAN, Fengmin GONG, Ali GOLSHAN, Shishir SINGH