Patents by Inventor Jason Kao

Jason Kao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10740469
    Abstract: Methods and apparatuses are described for automated secure software development management, risk assessment and risk remediation. A server generates security requirements for a software application under development based upon a plurality of technical attributes and a threat model. The server creates a first set of development tasks based upon the generated security requirements. The server scans source code to identify one or more security vulnerabilities and creates a second set of development tasks based upon the identified vulnerabilities. The server generates a security risk score based upon the generated security requirements and the identified vulnerabilities. The server deploys the software application under development to a production computing system upon determining that the security risk score satisfies a criterion.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: August 11, 2020
    Assignee: FMR LLC
    Inventors: Erkang Zheng, Jason Kao, Bingrong He
  • Patent number: 10601800
    Abstract: A computer-implemented method is provided for authenticating an identity of a user requesting access to a computerized resource via a client computing device. The method includes receiving, by the client computing device, a request to authenticate the identity of the user, determining, by the client computing device, a time period of the request, determining, by the client computing device, an approximate geolocation of the user, and determining, by the client computing device, one or more network characteristics associated with a current network of the client computing device. The method further includes transmitting, by the client computing device to an authentication device, authentication data including the request, the time period of the request, the approximate geolocation of the user and the one or network characteristics.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: March 24, 2020
    Assignee: FMR LLC
    Inventors: Jason Kao, Erkang Zheng
  • Patent number: 10503907
    Abstract: A computer-implemented system is provided for visualizing and analyzing security threats in a suite of software applications. The system includes a visualization module for rendering, on a computer display, a map with components representative of the suite of software applications and relationships among the software applications. The components are displayed in a base layer of the map. The system also includes a threat modeling module configured to automatically identify one or more security threats in the suite of software applications. The threat modeling module is adapted to interact with the visualization module to graphically depict on the computer display the one or more security threats on the map in a threat modeling layer. The system further includes a security controls module configured to implement security controls for mitigating the one or more security threats identified by the threat modeling module.
    Type: Grant
    Filed: December 14, 2016
    Date of Patent: December 10, 2019
    Assignee: FMR LLC
    Inventors: Erkang Zheng, Jason Kao
  • Patent number: 10469489
    Abstract: A computer-implemented method is described for authenticating an identity of a user requesting execution of a computerized transaction via a first client computing device. The first device and a second client computing device in proximity each execute applications for communicating with a server. The first and second devices contemporaneously capture voice sequences including at least one audible sound vocalized by the user, and a timestamp indicating when the sound is captured. The identity of the user is validated based upon a determination that the user vocalized the pass phrase, and a difference between the first timestamp and the second timestamp is below a predetermined threshold. The first device executes a computerized transaction with the server computing device upon receiving validation of the identity of the user.
    Type: Grant
    Filed: August 27, 2018
    Date of Patent: November 5, 2019
    Assignee: FMR LLC
    Inventor: Jason Kao
  • Publication number: 20190289000
    Abstract: A computer-implemented method is described for authenticating an identity of a user requesting execution of a computerized transaction via a first client computing device. The first device and a second client computing device in proximity each execute applications for communicating with a server. The first and second devices contemporaneously capture voice sequences including at least one audible sound vocalized by the user, and a timestamp indicating when the sound is captured. The identity of the user is validated based upon a determination that the user vocalized the pass phrase, and a difference between the first timestamp and the second timestamp is below a predetermined threshold. The first device executes a computerized transaction with the server computing device upon receiving validation of the identity of the user.
    Type: Application
    Filed: August 27, 2018
    Publication date: September 19, 2019
    Inventor: Jason Kao
  • Publication number: 20190205542
    Abstract: Methods and apparatuses are described for automated secure software development management, risk assessment and risk remediation. A server generates security requirements for a software application under development based upon a plurality of technical attributes and a threat model. The server creates a first set of development tasks based upon the generated security requirements. The server scans source code to identify one or more security vulnerabilities and creates a second set of development tasks based upon the identified vulnerabilities. The server generates a security risk score based upon the generated security requirements and the identified vulnerabilities. The server deploys the software application under development to a production computing system upon determining that the security risk score satisfies a criterion.
    Type: Application
    Filed: December 28, 2017
    Publication date: July 4, 2019
    Inventors: Jason Kao, Bingrong He, Erkang Zheng
  • Patent number: 10244113
    Abstract: Methods and apparatuses are described for determining customer service quality through digitized voice characteristic measurement and filtering. A voice analysis module captures a first digitized voice segment corresponding to speech submitted by a user of a remote device. The voice analysis module extracts a first set of voice features from the first voice segment, and determines an emotion level of the user based upon the first set of voice features. The voice analysis module captures a second digitized voice segment corresponding to speech submitted by the user. The voice analysis module extracts a second set of voice features from the second voice segment, and determines a change in the emotion level of the user by comparing the first set of voice features to the second set of voice features. The module normalizes the change in the emotion level of the user using emotion influence factors, and generates a service score.
    Type: Grant
    Filed: April 26, 2016
    Date of Patent: March 26, 2019
    Assignee: FMR LLC
    Inventors: Jason Kao, Xinxin Sheng, Bahram Omidfar, Erkang Zheng
  • Publication number: 20180248863
    Abstract: A computer-implemented method is provided for authenticating an identity of a user requesting access to a computerized resource via a client computing device. The method includes receiving, by the client computing device, a request to authenticate the identity of the user, determining, by the client computing device, a time period of the request, determining, by the client computing device, an approximate geolocation of the user, and determining, by the client computing device, one or more network characteristics associated with a current network of the client computing device. The method further includes transmitting, by the client computing device to an authentication device, authentication data including the request, the time period of the request, the approximate geolocation of the user and the one or network characteristics.
    Type: Application
    Filed: February 24, 2017
    Publication date: August 30, 2018
    Inventors: Jason Kao, Erkang Zheng
  • Patent number: 10063542
    Abstract: A computer-implemented method is described for authenticating an identity of a user requesting execution of a computerized transaction via a first client computing device. The first device and a second client computing device in proximity each execute applications for communicating with a server. The first and second devices contemporaneously capture voice sequences including at least one audible sound vocalized by the user, and a timestamp indicating when the sound is captured. The identity of the user is validated based upon a determination that the user vocalized the pass phrase, and a difference between the first timestamp and the second timestamp is below a predetermined threshold. The first device executes a computerized transaction with the server computing device upon receiving validation of the identity of the user.
    Type: Grant
    Filed: March 16, 2018
    Date of Patent: August 28, 2018
    Assignee: FMR LLC
    Inventor: Jason Kao
  • Publication number: 20170310820
    Abstract: Methods and apparatuses are described for determining customer service quality through digitized voice characteristic measurement and filtering. A voice analysis module captures a first digitized voice segment corresponding to speech submitted by a user of a remote device. The voice analysis module extracts a first set of voice features from the first voice segment, and determines an emotion level of the user based upon the first set of voice features. The voice analysis module captures a second digitized voice segment corresponding to speech submitted by the user. The voice analysis module extracts a second set of voice features from the second voice segment, and determines a change in the emotion level of the user by comparing the first set of voice features to the second set of voice features. The module normalizes the change in the emotion level of the user using emotion influence factors, and generates a service score.
    Type: Application
    Filed: April 26, 2016
    Publication date: October 26, 2017
    Inventors: Jason Kao, Xinxin Sheng, Bahram Omidfar, Erkang Zheng
  • Publication number: 20170169230
    Abstract: A computer-implemented system is provided for visualizing and analyzing security threats in a suite of software applications. The system includes a visualization module for rendering, on a computer display, a map with components representative of the suite of software applications and relationships among the software applications. The components are displayed in a base layer of the map. The system also includes a threat modeling module configured to automatically identify one or more security threats in the suite of software applications. The threat modeling module is adapted to interact with the visualization module to graphically depict on the computer display the one or more security threats on the map in a threat modeling layer. The system further includes a security controls module configured to implement security controls for mitigating the one or more security threats identified by the threat modeling module.
    Type: Application
    Filed: December 14, 2016
    Publication date: June 15, 2017
    Inventors: Erkang Zheng, Jason Kao
  • Publication number: 20090297349
    Abstract: An H-shaped vertical axis type windmill structure comprises a mainshaft on the top end of which is disposed a rotary shaft by a bearing. On the top and lower ends of the rotary shaft are disposed a support bracket and a support base, and in the middle of the rotary shaft is a connecting member. The support bracket, support base and the connecting member are connected to the connecting arms, and the other ends of the connecting arms are fixed to vertical blades. The connecting arms enable the blades to be vertically connected with the rotary shaft, and the mainshaft is not rotatable and serves as a stator of the generator structure. The vertically arranged straight and flat blades are easy to manufacture and fabricate and can be made of composite material for purpose of lightweight.
    Type: Application
    Filed: May 29, 2008
    Publication date: December 3, 2009
    Inventors: Ming-Kuo Chen, Allen Hsieh, Jacken Chen, Jason Kao