Patents by Inventor Jiang Tan

Jiang Tan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240187450
    Abstract: It is determined that a first email is present in a mailbox where emails deemed suspicious are placed for analysis. In response to determining that the first email is present in the mailbox, it is determined whether the first email is representative of a threat to an enterprise based at least in part by applying a trained model to the first email. In response to determining that the first email represents a threat to the enterprise, a record of the threat is generated by populating a data structure with information related to the first email. The data structure is applied to inboxes of a plurality of the employees to determine whether the first email is part of a campaign. In response to determining that the first email is part of a campaign, a filter associated with the data structure is applied to inbound emails addressed to employees of the enterprise.
    Type: Application
    Filed: February 15, 2024
    Publication date: June 6, 2024
    Inventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkat Krishnamoorthi, Fang Shuo Deng
  • Publication number: 20240171596
    Abstract: A message addressed to a user is received. A first model is applied to the message to produce a first output indicative of whether the message is representative of a non-malicious message. The first model is trained using past messages that have been verified as non-malicious messages. It is determined, based on the first output, that the message is potentially a malicious message. Responsive to determining that the message is potentially a malicious email based on the first output, apply a second model to the message to produce a second output indicative of whether the message is representative of a given type of attack. The second model is one of a plurality of models. At least one model included in the plurality of models is associated with characterizing a goal of the malicious message. An action is performed with respect to the message based on the second output.
    Type: Application
    Filed: September 26, 2023
    Publication date: May 23, 2024
    Inventors: Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan Reiser, Sanny Xiao Lang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
  • Patent number: 11978510
    Abstract: The present disclosure generally relates to memory devices and methods of forming the same. More particularly, the present disclosure relates to resistive random-access (ReRAM) memory devices incorporating reference cells for achieving high sensing yield. The present disclosure provides a memory device including a main cell structure including a switching element arranged between a pair of conductors, and a reference cell structure electrically coupled to the main cell structure. The reference cell structure includes a switching element arranged between a pair of conductors, in which the switching element of the reference cell structure has a dimension that is different from a dimension of the switching element of the main cell structure.
    Type: Grant
    Filed: July 28, 2021
    Date of Patent: May 7, 2024
    Assignee: GLOBALFOUNDRIES SINGAPORE PTE. LTD.
    Inventors: Curtis Chun-I Hsieh, Wei-Hui Hsu, Wanbing Yi, Yi Jiang, Kai Kang, Juan Boon Tan
  • Publication number: 20240136437
    Abstract: A ferroelectric field-effect transistor having an endurance exceeding 1012 cycles is disclosed. The ferroelectric field-effect transistor includes a substrate, a source disposed over a first region of the semiconductor substrate, a drain disposed over a second region of the substrate, wherein the second region is spaced apart from the first region. The ferroelectric field-effect transistor includes a channel made of a semiconductor material within a third region of the substrate that is between the first region and the second region. The ferroelectric field-effect transistor further includes a gate stack having an interfacial layer disposed over the channel, wherein the interfacial layer has a permittivity that is greater than 3.9, and a layer of ferroelectric material disposed over the interfacial layer.
    Type: Application
    Filed: February 22, 2022
    Publication date: April 25, 2024
    Inventors: Sayeef Salahuddin, Ava Jiang Tan
  • Patent number: 11949713
    Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: April 2, 2024
    Assignee: Abnormal Security Corporation
    Inventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Kishnamoorthi, Feng Shuo Deng
  • Patent number: 11943257
    Abstract: Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: March 26, 2024
    Assignee: Abnormal Security Corporation
    Inventors: Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
  • Patent number: 11940902
    Abstract: The invention discloses a code testing method. The method includes the following steps of: acquiring a code set to be tested; loading the code set to a corresponding operating chip, and executing the code set by using the operating chip; judging whether a target code subset which is not successfully executed exists in the code set; and if yes, performing an audit testing operation on the code set. The code testing method provided by the invention is simple and feasible to apply, which improves a testing reliability and reduces a testing cost. The invention also discloses a code testing apparatus and device, and a storage medium, which have corresponding technical effects.
    Type: Grant
    Filed: September 10, 2021
    Date of Patent: March 26, 2024
    Assignee: HANGZHOU VANGO TECHNOLOGIES, INC.
    Inventors: Jie He, Nick Nianxiong Tan, Xuening Jiang
  • Patent number: 11487704
    Abstract: Techniques for adjusting storage space involve: receiving a request for adjusting available storage space of a user in a filesystem from a first size to a second size; determining whether to allow to adjust the available storage space based on the request; and in response to allowing to adjust the available storage space, adjusting the available storage space to the second size. Accordingly, not only operations that an administrator needs to perform for adjusting the available storage space of a user is reduced, but also a quick and correct response for a request from a user of adjusting the available storage space is guaranteed.
    Type: Grant
    Filed: May 26, 2020
    Date of Patent: November 1, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Jiang Tan, Hao Wang, Chaojun Zhao, Hongyuan Zeng, Yang Zhang
  • Patent number: 11320997
    Abstract: Storage management techniques involve determining, from a set of users sharing a storage system, a plurality of target users with storage quotas to be updated; obtaining a total increase storage quota to be increased for the storage system; and determining allocation of the total increase storage quota among the plurality of target users according to at least one of a first strategy associated with quota proportions and a second strategy associated with a used storage capacity. The allocation of the increase storage quota is determined automatically according one or more predefined strategies, which can achieve storage quota allocation effectively and automatically, thereby increasing storage efficiency.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: May 3, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Hongyuan Zeng, Hao Wang, Chaojun Zhao, Yang Zhang, Jiang Tan
  • Publication number: 20210124509
    Abstract: Storage management techniques involve determining, from a set of users sharing a storage system, a plurality of target users with storage quotas to be updated; obtaining a total increase storage quota to be increased for the storage system; and determining allocation of the total increase storage quota among the plurality of target users according to at least one of a first strategy associated with quota proportions and a second strategy associated with a used storage capacity. The allocation of the increase storage quota is determined automatically according one or more predefined strategies, which can achieve storage quota allocation effectively and automatically, thereby increasing storage efficiency.
    Type: Application
    Filed: May 19, 2020
    Publication date: April 29, 2021
    Inventors: Hongyuan Zeng, Hao Wang, Chaojun Zhao, Yang Zhang, Jiang Tan
  • Publication number: 20210117376
    Abstract: Techniques for adjusting storage space involve: receiving a request for adjusting available storage space of a user in a filesystem from a first size to a second size; determining whether to allow to adjust the available storage space based on the request; and in response to allowing to adjust the available storage space, adjusting the available storage space to the second size. Accordingly, not only operations that an administrator needs to perform for adjusting the available storage space of a user is reduced, but also a quick and correct response for a request from a user of adjusting the available storage space is guaranteed.
    Type: Application
    Filed: May 26, 2020
    Publication date: April 22, 2021
    Inventors: Jiang Tan, Hao Wang, Chaojun Zhao, Hongyuan Zeng, Yang Zhang
  • Patent number: 10976954
    Abstract: Techniques involve managing a storage system. Along these lines, for each of a plurality of snapshots, a plurality of blocks referenced by the snapshot is determined. An evaluation score indicating an impact that deletion of the snapshot has on space release and data retention is determined based on at least one of: a reference count for the plurality of blocks, a size of a storage resource associated with the snapshot, and the number of blocks of the plurality of blocks that are referenced only once. At least one snapshot to be deleted is selected from the plurality of snapshots based on respective evaluation scores of the plurality of snapshots.
    Type: Grant
    Filed: September 24, 2019
    Date of Patent: April 13, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Hao Wang, Yang Zhang, Junfeng Wu, Jiang Tan
  • Patent number: 10921990
    Abstract: Techniques involve determining a first remaining lifetime of a flash device at a first time based on a warranty period, a factor of the number of writes per unit of time, and the number of executed writes for the flash device. The techniques further involve obtaining a second remaining lifetime at a second time prior to the first time, the second remaining lifetime being determined at the second time based on the warranty period, the factor of the number of writes per unit of time, and the number of executed writes. The techniques further involve determining a first lifetime decay rate based on the first and second remaining lifetimes. In addition, the techniques may determine a first predicted remaining lifetime based on the first lifetime decay rate. Accordingly, a remaining lifetime can be predicted based on the usage trend thereof.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: February 16, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Yang Zhang, Hao Wang, Jiang Tan
  • Publication number: 20200133513
    Abstract: Techniques involve determining a first remaining lifetime of a flash device at a first time based on a warranty period, a factor of the number of writes per unit of time, and the number of executed writes for the flash device. The techniques further involve obtaining a second remaining lifetime at a second time prior to the first time, the second remaining lifetime being determined at the second time based on the warranty period, the factor of the number of writes per unit of time, and the number of executed writes. The techniques further involve determining a first lifetime decay rate based on the first and second remaining lifetimes. In addition, the techniques may determine a first predicted remaining lifetime based on the first lifetime decay rate. Accordingly, a remaining lifetime can be predicted based on the usage trend thereof, such that the predicted remaining lifetime is more accurate.
    Type: Application
    Filed: September 17, 2019
    Publication date: April 30, 2020
    Inventors: Yang Zhang, Hao Wang, Jiang Tan
  • Publication number: 20200133560
    Abstract: Techniques involve managing a storage system. Along these lines, for each of a plurality of snapshots, a plurality of blocks referenced by the snapshot is determined. An evaluation score indicating an impact that deletion of the snapshot has on space release and data retention is determined based on at least one of: a reference count for the plurality of blocks, a size of a storage resource associated with the snapshot, and the number of blocks of the plurality of blocks that are referenced only once. At least one snapshot to be deleted is selected from the plurality of snapshots based on respective evaluation scores of the plurality of snapshots.
    Type: Application
    Filed: September 24, 2019
    Publication date: April 30, 2020
    Inventors: Hao Wang, Yang Zhang, Junfeng Wu, Jiang Tan
  • Patent number: 10230647
    Abstract: A data packet processing method, Where the method includes matching a received data packet in a flow table, and determining the received data packet as a newly-established data packet, where the newly-established data packet is a data packet that needs to be reported to a controller to determine a processing manner, determining a target priority of the newly-established data packet, and reporting the newly-established data packet to the controller according to the target priority. Priorities of data packets entering an OPENFLOW switch are determined, and for unsuccessfully matched data packets, a data packet having a high priority is forwarded preferentially according to the priorities, thereby ensuring that data having a high priority is not discarded.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: March 12, 2019
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Qiang Feng, Huan Zhang, Jiang Tan
  • Patent number: 10114577
    Abstract: A data reading method, a data processing device, and a data processing system are provided. The method, executed by a first control node, includes receiving a reading message forwarded by a data switching device, where the reading message is used to instruct the first control node to read first data, and the reading message is sent by a second control node to the data switching device; if a data status identifier of the first data in a first storage node is a valid identifier, reading the first data from the first storage node, and sending the read first data to the data switching device, so that the data switching device forwards the read first data to the second control node, where the valid identifier indicates that the first data on the first storage node is available. The present application ensures that the latest first data in the node group is read.
    Type: Grant
    Filed: September 19, 2017
    Date of Patent: October 30, 2018
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Hongkuan Liu, Laijun Zhong, Jiang Tan
  • Publication number: 20180004451
    Abstract: A data reading method, a data processing device, and a data processing system are provided. The method, executed by a first control node, includes receiving a reading message forwarded by a data switching device, where the reading message is used to instruct the first control node to read first data, and the reading message is sent by a second control node to the data switching device; if a data status identifier of the first data in a first storage node is a valid identifier, reading the first data from the first storage node, and sending the read first data to the data switching device, so that the data switching device forwards the read first data to the second control node, where the valid identifier indicates that the first data on the first storage node is available. The present application ensures that the latest first data in the node group is read.
    Type: Application
    Filed: September 19, 2017
    Publication date: January 4, 2018
    Inventors: Hongkuan Liu, Laijun Zhong, Jiang Tan
  • Publication number: 20170048153
    Abstract: A data packet processing method, Where the method includes matching a received data packet in a flow table, and determining the received data packet as a newly-established data packet, where the newly-established data packet is a data packet that needs to be reported to a controller to determine a processing manner, determining a target priority of the newly-established data packet, and reporting the newly-established data packet to the controller according to the target priority. Priorities of data packets entering an OPENFLOW switch are determined, and for unsuccessfully matched data packets, a data packet having a high priority is forwarded preferentially according to the priorities, thereby ensuring that data having a high priority is not discarded.
    Type: Application
    Filed: October 28, 2016
    Publication date: February 16, 2017
    Inventors: Qiang Feng, Huan Zhang, Jiang Tan