Patents by Inventor Shuo DENG

Shuo DENG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240187450
    Abstract: It is determined that a first email is present in a mailbox where emails deemed suspicious are placed for analysis. In response to determining that the first email is present in the mailbox, it is determined whether the first email is representative of a threat to an enterprise based at least in part by applying a trained model to the first email. In response to determining that the first email represents a threat to the enterprise, a record of the threat is generated by populating a data structure with information related to the first email. The data structure is applied to inboxes of a plurality of the employees to determine whether the first email is part of a campaign. In response to determining that the first email is part of a campaign, a filter associated with the data structure is applied to inbound emails addressed to employees of the enterprise.
    Type: Application
    Filed: February 15, 2024
    Publication date: June 6, 2024
    Inventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkat Krishnamoorthi, Fang Shuo Deng
  • Publication number: 20240152719
    Abstract: An information management method, a device, a system and a medium. The information management method applied to a first terminal, including: sending an information acquisition request to a server, so that the server responds to the information acquisition request and sends visitor information to the first terminal; receiving the visitor information sent by the server; generating card information according to the visitor information; and sending the card information to an electronic card, so that the electronic card displays the card information.
    Type: Application
    Filed: June 18, 2021
    Publication date: May 9, 2024
    Applicants: BEIJING BOE OPTOELECTRONICS TECHNOLOGY CO., LTD., BOE TECHNOLOGY GROUP CO., LTD.
    Inventors: Shuo Li, Junpeng Han, Jinmiao Tang, Yanjun Liu, Qingqing Ma, Yinan Gao, Yin Yuan, Tianjiao Wang, Hui Sun, Yonggang Xie, Guangquan Wang, Liguang Deng, Zixi Qi
  • Patent number: 11972580
    Abstract: This application relates to the field of video processing, and discloses a video stitching method and apparatus, an electronic device, and a non-transitory computer-readable storage medium, where the video stitching method includes: detecting a similarity between a first image and a second image, the first image being an image frame of a first to-be-stitched video, and the second image being an image frame of a second to-be-stitched video; then determining a motion vector of the first image relative to the second image when the similarity meets a preset condition; and then determining at least one compensated frame between the first image and the second image according to the motion vector, and stitching the first image and the second image based on the at least one compensated frame to stitch the first to-be-stitched video and the second to-be-stitched video.
    Type: Grant
    Filed: February 24, 2021
    Date of Patent: April 30, 2024
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventor: Shuo Deng
  • Patent number: 11948597
    Abstract: The embodiments of this application disclose an audio processing method and apparatus, an electronic device, and a storage medium. In the embodiments of this application, a current playback environment of audio may be obtained; audio recognition may be performed on ambient sound of the current playback environment in a case that the current playback environment is in a foreground state; foreground sound in the ambient sound may be determined according to an audio recognition result; the foreground sound in the ambient sound may be classified to determine a type of the foreground sound; and audio mixing may be performed on the foreground sound and the audio to obtain mixed playback sound based on the type of the foreground sound.
    Type: Grant
    Filed: November 16, 2021
    Date of Patent: April 2, 2024
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: Shuo Deng
  • Patent number: 11949713
    Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: April 2, 2024
    Assignee: Abnormal Security Corporation
    Inventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Kishnamoorthi, Feng Shuo Deng
  • Patent number: 11943257
    Abstract: Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: March 26, 2024
    Assignee: Abnormal Security Corporation
    Inventors: Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
  • Patent number: 11790060
    Abstract: Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication. These models can be stored in profiles that are associated with the employees. At a high level, these profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Moreover, remediation may be performed if an account is determined to be compromised based on its recent activity.
    Type: Grant
    Filed: March 2, 2021
    Date of Patent: October 17, 2023
    Assignee: Abnormal Security Corporation
    Inventors: Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
  • Publication number: 20230208876
    Abstract: Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.
    Type: Application
    Filed: December 21, 2022
    Publication date: June 29, 2023
    Inventors: Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
  • Patent number: 11663303
    Abstract: Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed. These models can be stored in profiles that are associated with the employees. Such profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Remediation can be performed if an account is determined to be compromised based on its recent activity.
    Type: Grant
    Filed: July 9, 2022
    Date of Patent: May 30, 2023
    Assignee: Abnormal Security Corporation
    Inventors: Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
  • Publication number: 20220342966
    Abstract: Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed. These models can be stored in profiles that are associated with the employees. Such profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Remediation can be performed if an account is determined to be compromised based on its recent activity.
    Type: Application
    Filed: July 9, 2022
    Publication date: October 27, 2022
    Inventors: Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
  • Publication number: 20220255961
    Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.
    Type: Application
    Filed: December 14, 2021
    Publication date: August 11, 2022
    Inventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Kishnamoorthi, Feng Shuo Deng
  • Publication number: 20220076692
    Abstract: The embodiments of this application disclose an audio processing method and apparatus, an electronic device, and a storage medium. In the embodiments of this application, a current playback environment of audio may be obtained; audio recognition may be performed on ambient sound of the current playback environment in a case that the current playback environment is in a foreground state; foreground sound in the ambient sound may be determined according to an audio recognition result; the foreground sound in the ambient sound may be classified to determine a type of the foreground sound; and audio mixing may be performed on the foreground sound and the audio to obtain mixed playback sound based on the type of the foreground sound.
    Type: Application
    Filed: November 16, 2021
    Publication date: March 10, 2022
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventor: Shuo DENG
  • Patent number: 11252189
    Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.
    Type: Grant
    Filed: January 22, 2021
    Date of Patent: February 15, 2022
    Assignee: Abnormal Security Corporation
    Inventors: Evan James Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Krishnamoorthi, Fang Shuo Deng
  • Publication number: 20210271741
    Abstract: Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication. These models can be stored in profiles that are associated with the employees. At a high level, these profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Moreover, remediation may be performed if an account is determined to be compromised based on its recent activity.
    Type: Application
    Filed: March 2, 2021
    Publication date: September 2, 2021
    Inventors: Rami Faris HABAL, Abhijit BAGRI, Yea So JUNG, Fang Shuo DENG, Jeremy KAO, Jeshua Alexis BRATMAN, Umut GULTEPE, Hariank Sagar Muthakana
  • Publication number: 20210273976
    Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.
    Type: Application
    Filed: January 22, 2021
    Publication date: September 2, 2021
    Inventors: Evan James Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Krishnamoorthi, Fang Shuo Deng
  • Publication number: 20210183013
    Abstract: This application relates to the field of video processing, and discloses a video stitching method and apparatus, an electronic device, and a non-transitory computer-readable storage medium, where the video stitching method includes: detecting a similarity between a first image and a second image, the first image being an image frame of a first to-be-stitched video, and the second image being an image frame of a second to-be-stitched video; then determining a motion vector of the first image relative to the second image when the similarity meets a preset condition; and then determining at least one compensated frame between the first image and the second image according to the motion vector, and stitching the first image and the second image based on the at least one compensated frame to stitch the first to-be-stitched video and the second to-be-stitched video.
    Type: Application
    Filed: February 24, 2021
    Publication date: June 17, 2021
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventor: Shuo DENG
  • Publication number: 20180270454
    Abstract: A video monitoring method and device are described. The method includes obtaining a video image data and a group to which a member belongs; screening the obtained video image data according to a permission mapping table and the obtained group; and displaying the screened video image data. With embodiments of the method and device, by reconstructing video monitoring contents and generating the video data required by a user according to the customization of different types of member groups, on the one hand, the purpose of the personalized browsing and privacy protection of the customized content is achieved to better ensure the security of video monitoring, thereby protecting the privacy of the video monitoring contents; on the other hand, actual workload of monitoring personnel is greatly reduced without reducing user perception, the transmission bandwidth is saved.
    Type: Application
    Filed: April 10, 2015
    Publication date: September 20, 2018
    Applicant: ZTE CORPORATION
    Inventor: Shuo DENG
  • Patent number: 9973517
    Abstract: Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware.
    Type: Grant
    Filed: January 7, 2014
    Date of Patent: May 15, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Hsu-Chun Hsiao, Shuo Deng, Babak Salamat, Rajarshi Gupta, Saumitra Mohan Das
  • Patent number: 9832211
    Abstract: Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware.
    Type: Grant
    Filed: March 19, 2012
    Date of Patent: November 28, 2017
    Assignee: QUALCOMM, Incorporated
    Inventors: Hsu-Chun Hsiao, Shuo Deng, Babak Salamat, Rajarshi Gupta, Saumitra Mohan Das
  • Publication number: 20160135755
    Abstract: A remote home health care system is described.
    Type: Application
    Filed: August 19, 2013
    Publication date: May 19, 2016
    Inventors: Ping Lu, Shuo Deng, Mengqian Lou, Yi Xie, Zhixin Sun