Patents by Inventor Qianyong Yu
Qianyong Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11356120Abstract: Described are systems and methods for storing a data object using a hierarchical erasure encoding to store a physical representation of the data object across a plurality of fault domains. A first erasure encoding is applied to the data object to generate a first set of shards of the data object. Individual shards of the set of shards may then be distributed across the fault domains for storage. Within the fault domains a second erasure encoding may be applied to the individual shards to generate a second set of shards. Finally, a manifest may be generate in order to reconstruct the data object from the first set of shards and the second set of shards.Type: GrantFiled: September 15, 2020Date of Patent: June 7, 2022Assignee: Amazon Technologies, Inc.Inventors: Seth W. Markle, Andrew Kent Warfield, Qianyong Yu, Grant Fresen
-
Patent number: 10382525Abstract: Systems and methods for injecting sensitive data into outgoing traffic on behalf of a user of a private network are provided. According to one embodiment, a network security appliance maintains a database of sensitive data. Secure submission of sensitive data of a user is facilitated by the security appliance in connection with interactions between a client and a server by: (i) intercepting outgoing traffic from the client to the server; (ii) determining whether the outgoing traffic matches a policy configured by an administrator of the private network that causes the sensitive data to be injected into the outgoing traffic by the network security device on behalf of the user; and (iii) when the determining is affirmative: (a) retrieving the sensitive data from the database; (b) modifying the outgoing traffic by injecting the sensitive data into the outgoing traffic; and (c) sending the modified outgoing traffic to the server.Type: GrantFiled: May 20, 2017Date of Patent: August 13, 2019Assignee: Fortinet, Inc.Inventor: Qianyong Yu
-
Patent number: 10057284Abstract: Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a network security device maintains a network traffic log that includes information associated with network activities observed within a private network. Responsive to an event, the network traffic log is retrospectively scanned in an attempt to identify a threat that was missed by a previous signature-based scan or a previous reputation-based scan of the observed network activities. When the threat is identified as a result of the retrospective scan, then remedial and/or preventive action is taken with respect to the threat.Type: GrantFiled: February 18, 2017Date of Patent: August 21, 2018Assignee: Fortinet, Inc.Inventor: Qianyong Yu
-
Publication number: 20170352034Abstract: In one embodiment, a method includes receiving, from a client device, a request to verify a client-side transaction record identifying a transaction involving a user of the client device. The method also includes verifying that the transaction identified in the client-side transaction record is also identified in a payment-network transaction record that is separate from the client-side transaction record. The method further includes, in response to verifying that the transaction identified in the client-side transaction record is also identified in the payment-network transaction record, publishing a verification of the transaction record. The method also includes sending, to the client device, a uniform resource identifier (URI) corresponding to a web location that includes the published verification of the transaction record.Type: ApplicationFiled: June 2, 2016Publication date: December 7, 2017Inventor: Qianyong Yu
-
Patent number: 9826023Abstract: Systems and methods for injecting sensitive data into outgoing traffic on behalf of a user of a private network are provided. According to one embodiment, a network security appliance maintains a database of sensitive data. Secure submission of sensitive data of a user is facilitated by the security appliance in connection with interactions between a client and a server by: (i) intercepting outgoing traffic from the client to the server; (ii) determining whether the outgoing traffic matches a policy configured by an administrator of the private network that causes the sensitive data to be injected into the outgoing traffic by the network security device on behalf of the user; and (iii) when the determining is affirmative: (a) retrieving the sensitive data from the database; (b) modifying the outgoing traffic by injecting the sensitive data into the outgoing traffic; and (c) sending the modified outgoing traffic to the server.Type: GrantFiled: August 15, 2016Date of Patent: November 21, 2017Assignee: Fortinet, Inc.Inventor: Qianyong Yu
-
Publication number: 20170257422Abstract: Systems and methods for injecting sensitive data into outgoing traffic on behalf of a user of a private network are provided. According to one embodiment, a network security appliance maintains a database of sensitive data. Secure submission of sensitive data of a user is facilitated by the security appliance in connection with interactions between a client and a server by: (i) intercepting outgoing traffic from the client to the server; (ii) determining whether the outgoing traffic matches a policy configured by an administrator of the private network that causes the sensitive data to be injected into the outgoing traffic by the network security device on behalf of the user; and (iii) when the determining is affirmative: (a) retrieving the sensitive data from the database; (b) modifying the outgoing traffic by injecting the sensitive data into the outgoing traffic; and (c) sending the modified outgoing traffic to the server.Type: ApplicationFiled: May 20, 2017Publication date: September 7, 2017Applicant: Fortinet, Inc.Inventor: Qianyong Yu
-
Publication number: 20170163674Abstract: Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a network security device maintains a network traffic log that includes information associated with network activities observed within a private network. Responsive to an event, the network traffic log is retrospectively scanned in an attempt to identify a threat that was missed by a previous signature-based scan or a previous reputation-based scan of the observed network activities. When the threat is identified as a result of the retrospective scan, then remedial and/or preventive action is taken with respect to the threat.Type: ApplicationFiled: February 18, 2017Publication date: June 8, 2017Applicant: Fortinet, Inc.Inventor: Qianyong Yu
-
Patent number: 9602527Abstract: Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a network security device maintains a network traffic log that includes information associated with network activities observed within a private network. Responsive to an event, the network traffic log is retrospectively scanned in an attempt to identify a threat that was missed by a previous signature-based scan or a previous reputation-based scan of the observed network activities. When the threat is identified as a result of the retrospective scan, then remedial and/or preventive action is taken with respect to the threat.Type: GrantFiled: March 19, 2015Date of Patent: March 21, 2017Assignee: Fortinet, Inc.Inventor: Qianyong Yu
-
Patent number: 9584587Abstract: Systems and methods for injecting sensitive data into outgoing traffic that is to be sent to a remote server from a client by a network security appliance logically interposed between the server and the client are provided. According to one embodiment, the method includes intercepting, by a network security appliance, outgoing traffic from the client to the server. The network security appliance identifies a submission command within the outgoing traffic that is used for submitting sensitive data of a user to the server. The network security appliance retrieves the sensitive data and modifies the outgoing traffic by injecting the sensitive data into the submission command to form modified outgoing traffic. The network security appliance transmits the modified outgoing traffic to the server.Type: GrantFiled: February 3, 2015Date of Patent: February 28, 2017Assignee: Fortinet, Inc.Inventor: Qianyong Yu
-
Publication number: 20160373471Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, a high-risk network access initiated by a device is identified by an intermediary security device. A human user test message is sent by the intermediary security device to a human user of the device to verify that the high-risk network access was initiated by or is otherwise authorized by the human user. A response to the human user test message is received by the intermediary security device. It is determined by the intermediary security device whether the response is a correct response to the human user test message. When the response is correct, the high-risk network access is allowed by the intermediary security device.Type: ApplicationFiled: September 6, 2016Publication date: December 22, 2016Applicant: Fortinet, Inc.Inventor: Qianyong Yu
-
Publication number: 20160352719Abstract: Systems and methods for injecting sensitive data into outgoing traffic on behalf of a user of a private network are provided. According to one embodiment, a network security appliance maintains a database of sensitive data. Secure submission of sensitive data of a user is facilitated by the security appliance in connection with interactions between a client and a server by: (i) intercepting outgoing traffic from the client to the server; (ii) determining whether the outgoing traffic matches a policy configured by an administrator of the private network that causes the sensitive data to be injected into the outgoing traffic by the network security device on behalf of the user; and (iii) when the determining is affirmative: (a) retrieving the sensitive data from the database; (b) modifying the outgoing traffic by injecting the sensitive data into the outgoing traffic; and (c) sending the modified outgoing traffic to the server.Type: ApplicationFiled: August 15, 2016Publication date: December 1, 2016Applicant: Fortinet, Inc.Inventor: Qianyong Yu
-
Patent number: 9462007Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, network security application includes a network traffic control module, a human user test engine and a risk management module. The network traffic control module identifies a high-risk network access initiated by a device associated with a private network protected by the network security appliance. The human user test engine (i) sends a human user test message to the human user of the device to verify that the high-risk network access was initiated by or is otherwise authorized by the human user of the device; receives a response to the human user test message; and (iii) determines whether the response is a correct response to the human user test message. The risk management module allows the high-risk network access when the response is correct.Type: GrantFiled: December 28, 2015Date of Patent: October 4, 2016Assignee: Fortinet, Inc.Inventor: Qianyong Yu
-
Publication number: 20160277431Abstract: Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a network security device maintains a network traffic log that includes information associated with network activities observed within a private network. Responsive to an event, the network traffic log is retrospectively scanned in an attempt to identify a threat that was missed by a previous signature-based scan or a previous reputation-based scan of the observed network activities. When the threat is identified as a result of the retrospective scan, then remedial and/or preventive action is taken with respect to the threat.Type: ApplicationFiled: March 19, 2015Publication date: September 22, 2016Applicant: FORTINET, INC.Inventor: Qianyong Yu
-
Publication number: 20160224801Abstract: Systems and methods for injecting sensitive data into outgoing traffic that is to be sent to a remote server from a client by a network security appliance logically interposed between the server and the client are provided. According to one embodiment, the method includes intercepting, by a network security appliance, outgoing traffic from the client to the server. The network security appliance identifies a submission command within the outgoing traffic that is used for submitting sensitive data of a user to the server. The network security appliance retrieves the sensitive data and modifies the outgoing traffic by injecting the sensitive data into the submission command to form modified outgoing traffic. The network security appliance transmits the modified outgoing traffic to the server.Type: ApplicationFiled: February 3, 2015Publication date: August 4, 2016Applicant: FORTINET, INC.Inventor: Qianyong Yu
-
Publication number: 20160112439Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, network security application includes a network traffic control module, a human user test engine and a risk management module. The network traffic control module identifies a high-risk network access initiated by a device associated with a private network protected by the network security appliance. The human user test engine (i) sends a human user test message to the human user of the device to verify that the high-risk network access was initiated by or is otherwise authorized by the human user of the device; receives a response to the human user test message; and (iii) determines whether the response is a correct response to the human user test message. The risk management module allows the high-risk network access when the response is correct.Type: ApplicationFiled: December 28, 2015Publication date: April 21, 2016Applicant: Fortinet, Inc.Inventor: Qianyong Yu
-
Patent number: 9231910Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, a request that is sent from a client to a server is captured by an intermediary security device logically interposed between the client and the server. A human user test message is sent by the intermediary security device to the client to verify that the request was initiated by a human user of the client. A response to the human user test message is received by the intermediary security device. It is determined by the intermediary security device whether the response is a correct response to the human user test message. When the determination is affirmative, the request is allowed to pass through the intermediary security device and to be delivered to the server.Type: GrantFiled: May 15, 2015Date of Patent: January 5, 2016Assignee: Fortinet, Inc.Inventor: Qianyong Yu
-
Publication number: 20150249641Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, a request that is sent from a client to a server is captured by an intermediary security device logically interposed between the client and the server. A human user test message is sent by the intermediary security device to the client to verify that the request was initiated by a human user of the client. A response to the human user test message is received by the intermediary security device. It is determined by the intermediary security device whether the response is a correct response to the human user test message. When the determination is affirmative, the request is allowed to pass through the intermediary security device and to be delivered to the server.Type: ApplicationFiled: May 15, 2015Publication date: September 3, 2015Applicant: FORTINET, INC.Inventor: Qianyong Yu
-
Patent number: 9083677Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, when an intermediary security device identifies a high-risk network access that is potentially initiated by a human user or a piece of software running on the device of the human user, a human user test message is sent to the human user to verify that the high-risk network access was indeed initiated by the human user. After a response to the human user test message is received by the intermediary security device, it is determined if the response is a correct response to the human user test. The security device allows the high risk network access if the response is correct.Type: GrantFiled: December 19, 2013Date of Patent: July 14, 2015Assignee: Fortinet, Inc.Inventor: Qianyong Yu
-
Publication number: 20150180829Abstract: Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, when an intermediary security device identifies a high-risk network access that is potentially initiated by a human user or a piece of software running on the device of the human user, a human user test message is sent to the human user to verify that the high-risk network access was indeed initiated by the human user. After a response to the human user test message is received by the intermediary security device, it is determined if the response is a correct response to the human user test. The security device allows the high risk network access if the response is correct.Type: ApplicationFiled: December 19, 2013Publication date: June 25, 2015Applicant: FORTINET, INC.Inventor: Qianyong Yu