Patents by Inventor Qianyong Yu

Qianyong Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11356120
    Abstract: Described are systems and methods for storing a data object using a hierarchical erasure encoding to store a physical representation of the data object across a plurality of fault domains. A first erasure encoding is applied to the data object to generate a first set of shards of the data object. Individual shards of the set of shards may then be distributed across the fault domains for storage. Within the fault domains a second erasure encoding may be applied to the individual shards to generate a second set of shards. Finally, a manifest may be generate in order to reconstruct the data object from the first set of shards and the second set of shards.
    Type: Grant
    Filed: September 15, 2020
    Date of Patent: June 7, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Seth W. Markle, Andrew Kent Warfield, Qianyong Yu, Grant Fresen
  • Patent number: 10382525
    Abstract: Systems and methods for injecting sensitive data into outgoing traffic on behalf of a user of a private network are provided. According to one embodiment, a network security appliance maintains a database of sensitive data. Secure submission of sensitive data of a user is facilitated by the security appliance in connection with interactions between a client and a server by: (i) intercepting outgoing traffic from the client to the server; (ii) determining whether the outgoing traffic matches a policy configured by an administrator of the private network that causes the sensitive data to be injected into the outgoing traffic by the network security device on behalf of the user; and (iii) when the determining is affirmative: (a) retrieving the sensitive data from the database; (b) modifying the outgoing traffic by injecting the sensitive data into the outgoing traffic; and (c) sending the modified outgoing traffic to the server.
    Type: Grant
    Filed: May 20, 2017
    Date of Patent: August 13, 2019
    Assignee: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Patent number: 10057284
    Abstract: Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a network security device maintains a network traffic log that includes information associated with network activities observed within a private network. Responsive to an event, the network traffic log is retrospectively scanned in an attempt to identify a threat that was missed by a previous signature-based scan or a previous reputation-based scan of the observed network activities. When the threat is identified as a result of the retrospective scan, then remedial and/or preventive action is taken with respect to the threat.
    Type: Grant
    Filed: February 18, 2017
    Date of Patent: August 21, 2018
    Assignee: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Publication number: 20170352034
    Abstract: In one embodiment, a method includes receiving, from a client device, a request to verify a client-side transaction record identifying a transaction involving a user of the client device. The method also includes verifying that the transaction identified in the client-side transaction record is also identified in a payment-network transaction record that is separate from the client-side transaction record. The method further includes, in response to verifying that the transaction identified in the client-side transaction record is also identified in the payment-network transaction record, publishing a verification of the transaction record. The method also includes sending, to the client device, a uniform resource identifier (URI) corresponding to a web location that includes the published verification of the transaction record.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 7, 2017
    Inventor: Qianyong Yu
  • Patent number: 9826023
    Abstract: Systems and methods for injecting sensitive data into outgoing traffic on behalf of a user of a private network are provided. According to one embodiment, a network security appliance maintains a database of sensitive data. Secure submission of sensitive data of a user is facilitated by the security appliance in connection with interactions between a client and a server by: (i) intercepting outgoing traffic from the client to the server; (ii) determining whether the outgoing traffic matches a policy configured by an administrator of the private network that causes the sensitive data to be injected into the outgoing traffic by the network security device on behalf of the user; and (iii) when the determining is affirmative: (a) retrieving the sensitive data from the database; (b) modifying the outgoing traffic by injecting the sensitive data into the outgoing traffic; and (c) sending the modified outgoing traffic to the server.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: November 21, 2017
    Assignee: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Publication number: 20170257422
    Abstract: Systems and methods for injecting sensitive data into outgoing traffic on behalf of a user of a private network are provided. According to one embodiment, a network security appliance maintains a database of sensitive data. Secure submission of sensitive data of a user is facilitated by the security appliance in connection with interactions between a client and a server by: (i) intercepting outgoing traffic from the client to the server; (ii) determining whether the outgoing traffic matches a policy configured by an administrator of the private network that causes the sensitive data to be injected into the outgoing traffic by the network security device on behalf of the user; and (iii) when the determining is affirmative: (a) retrieving the sensitive data from the database; (b) modifying the outgoing traffic by injecting the sensitive data into the outgoing traffic; and (c) sending the modified outgoing traffic to the server.
    Type: Application
    Filed: May 20, 2017
    Publication date: September 7, 2017
    Applicant: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Publication number: 20170163674
    Abstract: Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a network security device maintains a network traffic log that includes information associated with network activities observed within a private network. Responsive to an event, the network traffic log is retrospectively scanned in an attempt to identify a threat that was missed by a previous signature-based scan or a previous reputation-based scan of the observed network activities. When the threat is identified as a result of the retrospective scan, then remedial and/or preventive action is taken with respect to the threat.
    Type: Application
    Filed: February 18, 2017
    Publication date: June 8, 2017
    Applicant: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Patent number: 9602527
    Abstract: Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a network security device maintains a network traffic log that includes information associated with network activities observed within a private network. Responsive to an event, the network traffic log is retrospectively scanned in an attempt to identify a threat that was missed by a previous signature-based scan or a previous reputation-based scan of the observed network activities. When the threat is identified as a result of the retrospective scan, then remedial and/or preventive action is taken with respect to the threat.
    Type: Grant
    Filed: March 19, 2015
    Date of Patent: March 21, 2017
    Assignee: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Patent number: 9584587
    Abstract: Systems and methods for injecting sensitive data into outgoing traffic that is to be sent to a remote server from a client by a network security appliance logically interposed between the server and the client are provided. According to one embodiment, the method includes intercepting, by a network security appliance, outgoing traffic from the client to the server. The network security appliance identifies a submission command within the outgoing traffic that is used for submitting sensitive data of a user to the server. The network security appliance retrieves the sensitive data and modifies the outgoing traffic by injecting the sensitive data into the submission command to form modified outgoing traffic. The network security appliance transmits the modified outgoing traffic to the server.
    Type: Grant
    Filed: February 3, 2015
    Date of Patent: February 28, 2017
    Assignee: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Publication number: 20160373471
    Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, a high-risk network access initiated by a device is identified by an intermediary security device. A human user test message is sent by the intermediary security device to a human user of the device to verify that the high-risk network access was initiated by or is otherwise authorized by the human user. A response to the human user test message is received by the intermediary security device. It is determined by the intermediary security device whether the response is a correct response to the human user test message. When the response is correct, the high-risk network access is allowed by the intermediary security device.
    Type: Application
    Filed: September 6, 2016
    Publication date: December 22, 2016
    Applicant: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Publication number: 20160352719
    Abstract: Systems and methods for injecting sensitive data into outgoing traffic on behalf of a user of a private network are provided. According to one embodiment, a network security appliance maintains a database of sensitive data. Secure submission of sensitive data of a user is facilitated by the security appliance in connection with interactions between a client and a server by: (i) intercepting outgoing traffic from the client to the server; (ii) determining whether the outgoing traffic matches a policy configured by an administrator of the private network that causes the sensitive data to be injected into the outgoing traffic by the network security device on behalf of the user; and (iii) when the determining is affirmative: (a) retrieving the sensitive data from the database; (b) modifying the outgoing traffic by injecting the sensitive data into the outgoing traffic; and (c) sending the modified outgoing traffic to the server.
    Type: Application
    Filed: August 15, 2016
    Publication date: December 1, 2016
    Applicant: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Patent number: 9462007
    Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, network security application includes a network traffic control module, a human user test engine and a risk management module. The network traffic control module identifies a high-risk network access initiated by a device associated with a private network protected by the network security appliance. The human user test engine (i) sends a human user test message to the human user of the device to verify that the high-risk network access was initiated by or is otherwise authorized by the human user of the device; receives a response to the human user test message; and (iii) determines whether the response is a correct response to the human user test message. The risk management module allows the high-risk network access when the response is correct.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: October 4, 2016
    Assignee: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Publication number: 20160277431
    Abstract: Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a network security device maintains a network traffic log that includes information associated with network activities observed within a private network. Responsive to an event, the network traffic log is retrospectively scanned in an attempt to identify a threat that was missed by a previous signature-based scan or a previous reputation-based scan of the observed network activities. When the threat is identified as a result of the retrospective scan, then remedial and/or preventive action is taken with respect to the threat.
    Type: Application
    Filed: March 19, 2015
    Publication date: September 22, 2016
    Applicant: FORTINET, INC.
    Inventor: Qianyong Yu
  • Publication number: 20160224801
    Abstract: Systems and methods for injecting sensitive data into outgoing traffic that is to be sent to a remote server from a client by a network security appliance logically interposed between the server and the client are provided. According to one embodiment, the method includes intercepting, by a network security appliance, outgoing traffic from the client to the server. The network security appliance identifies a submission command within the outgoing traffic that is used for submitting sensitive data of a user to the server. The network security appliance retrieves the sensitive data and modifies the outgoing traffic by injecting the sensitive data into the submission command to form modified outgoing traffic. The network security appliance transmits the modified outgoing traffic to the server.
    Type: Application
    Filed: February 3, 2015
    Publication date: August 4, 2016
    Applicant: FORTINET, INC.
    Inventor: Qianyong Yu
  • Publication number: 20160112439
    Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, network security application includes a network traffic control module, a human user test engine and a risk management module. The network traffic control module identifies a high-risk network access initiated by a device associated with a private network protected by the network security appliance. The human user test engine (i) sends a human user test message to the human user of the device to verify that the high-risk network access was initiated by or is otherwise authorized by the human user of the device; receives a response to the human user test message; and (iii) determines whether the response is a correct response to the human user test message. The risk management module allows the high-risk network access when the response is correct.
    Type: Application
    Filed: December 28, 2015
    Publication date: April 21, 2016
    Applicant: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Patent number: 9231910
    Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, a request that is sent from a client to a server is captured by an intermediary security device logically interposed between the client and the server. A human user test message is sent by the intermediary security device to the client to verify that the request was initiated by a human user of the client. A response to the human user test message is received by the intermediary security device. It is determined by the intermediary security device whether the response is a correct response to the human user test message. When the determination is affirmative, the request is allowed to pass through the intermediary security device and to be delivered to the server.
    Type: Grant
    Filed: May 15, 2015
    Date of Patent: January 5, 2016
    Assignee: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Publication number: 20150249641
    Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, a request that is sent from a client to a server is captured by an intermediary security device logically interposed between the client and the server. A human user test message is sent by the intermediary security device to the client to verify that the request was initiated by a human user of the client. A response to the human user test message is received by the intermediary security device. It is determined by the intermediary security device whether the response is a correct response to the human user test message. When the determination is affirmative, the request is allowed to pass through the intermediary security device and to be delivered to the server.
    Type: Application
    Filed: May 15, 2015
    Publication date: September 3, 2015
    Applicant: FORTINET, INC.
    Inventor: Qianyong Yu
  • Patent number: 9083677
    Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, when an intermediary security device identifies a high-risk network access that is potentially initiated by a human user or a piece of software running on the device of the human user, a human user test message is sent to the human user to verify that the high-risk network access was indeed initiated by the human user. After a response to the human user test message is received by the intermediary security device, it is determined if the response is a correct response to the human user test. The security device allows the high risk network access if the response is correct.
    Type: Grant
    Filed: December 19, 2013
    Date of Patent: July 14, 2015
    Assignee: Fortinet, Inc.
    Inventor: Qianyong Yu
  • Publication number: 20150180829
    Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, when an intermediary security device identifies a high-risk network access that is potentially initiated by a human user or a piece of software running on the device of the human user, a human user test message is sent to the human user to verify that the high-risk network access was indeed initiated by the human user. After a response to the human user test message is received by the intermediary security device, it is determined if the response is a correct response to the human user test. The security device allows the high risk network access if the response is correct.
    Type: Application
    Filed: December 19, 2013
    Publication date: June 25, 2015
    Applicant: FORTINET, INC.
    Inventor: Qianyong Yu