Patents by Inventor Jiang Tan
Jiang Tan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240187450Abstract: It is determined that a first email is present in a mailbox where emails deemed suspicious are placed for analysis. In response to determining that the first email is present in the mailbox, it is determined whether the first email is representative of a threat to an enterprise based at least in part by applying a trained model to the first email. In response to determining that the first email represents a threat to the enterprise, a record of the threat is generated by populating a data structure with information related to the first email. The data structure is applied to inboxes of a plurality of the employees to determine whether the first email is part of a campaign. In response to determining that the first email is part of a campaign, a filter associated with the data structure is applied to inbound emails addressed to employees of the enterprise.Type: ApplicationFiled: February 15, 2024Publication date: June 6, 2024Inventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkat Krishnamoorthi, Fang Shuo Deng
-
Publication number: 20240171596Abstract: A message addressed to a user is received. A first model is applied to the message to produce a first output indicative of whether the message is representative of a non-malicious message. The first model is trained using past messages that have been verified as non-malicious messages. It is determined, based on the first output, that the message is potentially a malicious message. Responsive to determining that the message is potentially a malicious email based on the first output, apply a second model to the message to produce a second output indicative of whether the message is representative of a given type of attack. The second model is one of a plurality of models. At least one model included in the plurality of models is associated with characterizing a goal of the malicious message. An action is performed with respect to the message based on the second output.Type: ApplicationFiled: September 26, 2023Publication date: May 23, 2024Inventors: Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan Reiser, Sanny Xiao Lang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
-
Patent number: 11978510Abstract: The present disclosure generally relates to memory devices and methods of forming the same. More particularly, the present disclosure relates to resistive random-access (ReRAM) memory devices incorporating reference cells for achieving high sensing yield. The present disclosure provides a memory device including a main cell structure including a switching element arranged between a pair of conductors, and a reference cell structure electrically coupled to the main cell structure. The reference cell structure includes a switching element arranged between a pair of conductors, in which the switching element of the reference cell structure has a dimension that is different from a dimension of the switching element of the main cell structure.Type: GrantFiled: July 28, 2021Date of Patent: May 7, 2024Assignee: GLOBALFOUNDRIES SINGAPORE PTE. LTD.Inventors: Curtis Chun-I Hsieh, Wei-Hui Hsu, Wanbing Yi, Yi Jiang, Kai Kang, Juan Boon Tan
-
Publication number: 20240136437Abstract: A ferroelectric field-effect transistor having an endurance exceeding 1012 cycles is disclosed. The ferroelectric field-effect transistor includes a substrate, a source disposed over a first region of the semiconductor substrate, a drain disposed over a second region of the substrate, wherein the second region is spaced apart from the first region. The ferroelectric field-effect transistor includes a channel made of a semiconductor material within a third region of the substrate that is between the first region and the second region. The ferroelectric field-effect transistor further includes a gate stack having an interfacial layer disposed over the channel, wherein the interfacial layer has a permittivity that is greater than 3.9, and a layer of ferroelectric material disposed over the interfacial layer.Type: ApplicationFiled: February 22, 2022Publication date: April 25, 2024Inventors: Sayeef Salahuddin, Ava Jiang Tan
-
Patent number: 11949713Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.Type: GrantFiled: December 14, 2021Date of Patent: April 2, 2024Assignee: Abnormal Security CorporationInventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Kishnamoorthi, Feng Shuo Deng
-
Patent number: 11943257Abstract: Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.Type: GrantFiled: December 21, 2022Date of Patent: March 26, 2024Assignee: Abnormal Security CorporationInventors: Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
-
Patent number: 11940902Abstract: The invention discloses a code testing method. The method includes the following steps of: acquiring a code set to be tested; loading the code set to a corresponding operating chip, and executing the code set by using the operating chip; judging whether a target code subset which is not successfully executed exists in the code set; and if yes, performing an audit testing operation on the code set. The code testing method provided by the invention is simple and feasible to apply, which improves a testing reliability and reduces a testing cost. The invention also discloses a code testing apparatus and device, and a storage medium, which have corresponding technical effects.Type: GrantFiled: September 10, 2021Date of Patent: March 26, 2024Assignee: HANGZHOU VANGO TECHNOLOGIES, INC.Inventors: Jie He, Nick Nianxiong Tan, Xuening Jiang
-
Patent number: 11487704Abstract: Techniques for adjusting storage space involve: receiving a request for adjusting available storage space of a user in a filesystem from a first size to a second size; determining whether to allow to adjust the available storage space based on the request; and in response to allowing to adjust the available storage space, adjusting the available storage space to the second size. Accordingly, not only operations that an administrator needs to perform for adjusting the available storage space of a user is reduced, but also a quick and correct response for a request from a user of adjusting the available storage space is guaranteed.Type: GrantFiled: May 26, 2020Date of Patent: November 1, 2022Assignee: EMC IP Holding Company LLCInventors: Jiang Tan, Hao Wang, Chaojun Zhao, Hongyuan Zeng, Yang Zhang
-
Patent number: 11320997Abstract: Storage management techniques involve determining, from a set of users sharing a storage system, a plurality of target users with storage quotas to be updated; obtaining a total increase storage quota to be increased for the storage system; and determining allocation of the total increase storage quota among the plurality of target users according to at least one of a first strategy associated with quota proportions and a second strategy associated with a used storage capacity. The allocation of the increase storage quota is determined automatically according one or more predefined strategies, which can achieve storage quota allocation effectively and automatically, thereby increasing storage efficiency.Type: GrantFiled: May 19, 2020Date of Patent: May 3, 2022Assignee: EMC IP Holding Company LLCInventors: Hongyuan Zeng, Hao Wang, Chaojun Zhao, Yang Zhang, Jiang Tan
-
Publication number: 20210124509Abstract: Storage management techniques involve determining, from a set of users sharing a storage system, a plurality of target users with storage quotas to be updated; obtaining a total increase storage quota to be increased for the storage system; and determining allocation of the total increase storage quota among the plurality of target users according to at least one of a first strategy associated with quota proportions and a second strategy associated with a used storage capacity. The allocation of the increase storage quota is determined automatically according one or more predefined strategies, which can achieve storage quota allocation effectively and automatically, thereby increasing storage efficiency.Type: ApplicationFiled: May 19, 2020Publication date: April 29, 2021Inventors: Hongyuan Zeng, Hao Wang, Chaojun Zhao, Yang Zhang, Jiang Tan
-
Publication number: 20210117376Abstract: Techniques for adjusting storage space involve: receiving a request for adjusting available storage space of a user in a filesystem from a first size to a second size; determining whether to allow to adjust the available storage space based on the request; and in response to allowing to adjust the available storage space, adjusting the available storage space to the second size. Accordingly, not only operations that an administrator needs to perform for adjusting the available storage space of a user is reduced, but also a quick and correct response for a request from a user of adjusting the available storage space is guaranteed.Type: ApplicationFiled: May 26, 2020Publication date: April 22, 2021Inventors: Jiang Tan, Hao Wang, Chaojun Zhao, Hongyuan Zeng, Yang Zhang
-
Patent number: 10976954Abstract: Techniques involve managing a storage system. Along these lines, for each of a plurality of snapshots, a plurality of blocks referenced by the snapshot is determined. An evaluation score indicating an impact that deletion of the snapshot has on space release and data retention is determined based on at least one of: a reference count for the plurality of blocks, a size of a storage resource associated with the snapshot, and the number of blocks of the plurality of blocks that are referenced only once. At least one snapshot to be deleted is selected from the plurality of snapshots based on respective evaluation scores of the plurality of snapshots.Type: GrantFiled: September 24, 2019Date of Patent: April 13, 2021Assignee: EMC IP Holding Company LLCInventors: Hao Wang, Yang Zhang, Junfeng Wu, Jiang Tan
-
Patent number: 10921990Abstract: Techniques involve determining a first remaining lifetime of a flash device at a first time based on a warranty period, a factor of the number of writes per unit of time, and the number of executed writes for the flash device. The techniques further involve obtaining a second remaining lifetime at a second time prior to the first time, the second remaining lifetime being determined at the second time based on the warranty period, the factor of the number of writes per unit of time, and the number of executed writes. The techniques further involve determining a first lifetime decay rate based on the first and second remaining lifetimes. In addition, the techniques may determine a first predicted remaining lifetime based on the first lifetime decay rate. Accordingly, a remaining lifetime can be predicted based on the usage trend thereof.Type: GrantFiled: September 17, 2019Date of Patent: February 16, 2021Assignee: EMC IP Holding Company LLCInventors: Yang Zhang, Hao Wang, Jiang Tan
-
Publication number: 20200133513Abstract: Techniques involve determining a first remaining lifetime of a flash device at a first time based on a warranty period, a factor of the number of writes per unit of time, and the number of executed writes for the flash device. The techniques further involve obtaining a second remaining lifetime at a second time prior to the first time, the second remaining lifetime being determined at the second time based on the warranty period, the factor of the number of writes per unit of time, and the number of executed writes. The techniques further involve determining a first lifetime decay rate based on the first and second remaining lifetimes. In addition, the techniques may determine a first predicted remaining lifetime based on the first lifetime decay rate. Accordingly, a remaining lifetime can be predicted based on the usage trend thereof, such that the predicted remaining lifetime is more accurate.Type: ApplicationFiled: September 17, 2019Publication date: April 30, 2020Inventors: Yang Zhang, Hao Wang, Jiang Tan
-
Publication number: 20200133560Abstract: Techniques involve managing a storage system. Along these lines, for each of a plurality of snapshots, a plurality of blocks referenced by the snapshot is determined. An evaluation score indicating an impact that deletion of the snapshot has on space release and data retention is determined based on at least one of: a reference count for the plurality of blocks, a size of a storage resource associated with the snapshot, and the number of blocks of the plurality of blocks that are referenced only once. At least one snapshot to be deleted is selected from the plurality of snapshots based on respective evaluation scores of the plurality of snapshots.Type: ApplicationFiled: September 24, 2019Publication date: April 30, 2020Inventors: Hao Wang, Yang Zhang, Junfeng Wu, Jiang Tan
-
Patent number: 10230647Abstract: A data packet processing method, Where the method includes matching a received data packet in a flow table, and determining the received data packet as a newly-established data packet, where the newly-established data packet is a data packet that needs to be reported to a controller to determine a processing manner, determining a target priority of the newly-established data packet, and reporting the newly-established data packet to the controller according to the target priority. Priorities of data packets entering an OPENFLOW switch are determined, and for unsuccessfully matched data packets, a data packet having a high priority is forwarded preferentially according to the priorities, thereby ensuring that data having a high priority is not discarded.Type: GrantFiled: October 28, 2016Date of Patent: March 12, 2019Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Qiang Feng, Huan Zhang, Jiang Tan
-
Patent number: 10114577Abstract: A data reading method, a data processing device, and a data processing system are provided. The method, executed by a first control node, includes receiving a reading message forwarded by a data switching device, where the reading message is used to instruct the first control node to read first data, and the reading message is sent by a second control node to the data switching device; if a data status identifier of the first data in a first storage node is a valid identifier, reading the first data from the first storage node, and sending the read first data to the data switching device, so that the data switching device forwards the read first data to the second control node, where the valid identifier indicates that the first data on the first storage node is available. The present application ensures that the latest first data in the node group is read.Type: GrantFiled: September 19, 2017Date of Patent: October 30, 2018Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Hongkuan Liu, Laijun Zhong, Jiang Tan
-
Publication number: 20180004451Abstract: A data reading method, a data processing device, and a data processing system are provided. The method, executed by a first control node, includes receiving a reading message forwarded by a data switching device, where the reading message is used to instruct the first control node to read first data, and the reading message is sent by a second control node to the data switching device; if a data status identifier of the first data in a first storage node is a valid identifier, reading the first data from the first storage node, and sending the read first data to the data switching device, so that the data switching device forwards the read first data to the second control node, where the valid identifier indicates that the first data on the first storage node is available. The present application ensures that the latest first data in the node group is read.Type: ApplicationFiled: September 19, 2017Publication date: January 4, 2018Inventors: Hongkuan Liu, Laijun Zhong, Jiang Tan
-
Publication number: 20170048153Abstract: A data packet processing method, Where the method includes matching a received data packet in a flow table, and determining the received data packet as a newly-established data packet, where the newly-established data packet is a data packet that needs to be reported to a controller to determine a processing manner, determining a target priority of the newly-established data packet, and reporting the newly-established data packet to the controller according to the target priority. Priorities of data packets entering an OPENFLOW switch are determined, and for unsuccessfully matched data packets, a data packet having a high priority is forwarded preferentially according to the priorities, thereby ensuring that data having a high priority is not discarded.Type: ApplicationFiled: October 28, 2016Publication date: February 16, 2017Inventors: Qiang Feng, Huan Zhang, Jiang Tan