Patents by Inventor Siying Yang

Siying Yang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10333924
    Abstract: Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for reliable identification of computing devices. The method can include receiving, by a computing system, a request from a computing device for an electronic resource. The computing system can identify a security token received from the device that made the request. Based on the security token, particular security countermeasures can be selected that are to be applied to the electronic resource to be served in response to the request. The countermeasures can be operable to interfere with an ability of malware to interact with the served electronic resource when the served electronic resource is on the computing device. Portions of the electronic resource that are to be executed on the computing device can be re-coded using the selected particular security countermeasures.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: June 25, 2019
    Inventor: Siying Yang
  • Publication number: 20190081977
    Abstract: In an embodiment, a computer system is configured to receive, from a client computer, a request with one or more values; determine, based on the one or more values, whether the request is from a platform-specific application compiled for a first computer platform; determine, based on the one or more values, whether the platform-specific application is being executed within an emulator being executed by a second computer platform, wherein the second computer platform is different than the first computer platform.
    Type: Application
    Filed: November 13, 2018
    Publication date: March 14, 2019
    Inventors: SIYING YANG, SHUMAN GHOSEMAJUMDER
  • Patent number: 10216488
    Abstract: A computer implemented method for improving security of a server computer that is configured to deliver computer program instructions to a remote client computer, and comprising, using an intermediary computer that is topologically interposed between the server computer and the remote client computer is provided. The intermediary computer is configured to intercept a first set of source code instructions from the server computer. The intermediary computer identifies first party operations that include operations on objects and the objects themselves. The intermediary computer identifies a first set of operations within the first party operations that are configured to define values for one or more objects based on one or more constants. The intermediary computer then generates a second set of operations, where the second set of operations are configured to define same values for the one or more objects, when executed by a web browser on the client computer.
    Type: Grant
    Filed: March 14, 2016
    Date of Patent: February 26, 2019
    Assignee: Shape Security, Inc.
    Inventors: Jarrod Overson, Siying Yang
  • Patent number: 10212130
    Abstract: Methods and apparatus are described for detecting browser extensions. Specific implementations relate to configurable security policies and automated actions performed in response to the detection of browser extensions.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: February 19, 2019
    Assignee: Shape Security, Inc.
    Inventors: Siying Yang, Sergey Shekyan
  • Patent number: 10129289
    Abstract: In an embodiment, a computer system is configured to receive, from a client computer, a request with one or more values; determine, based on the one or more values, whether the request is from a platform-specific application compiled for a first computer platform; determine, based on the one or more values, whether the platform-specific application is being executed within an emulator being executed by a second computer platform, wherein the second computer platform is different than the first computer platform.
    Type: Grant
    Filed: March 11, 2016
    Date of Patent: November 13, 2018
    Assignee: Shape Security, Inc.
    Inventors: Siying Yang, Shuman Ghosemajumder
  • Publication number: 20180270229
    Abstract: Systems, methods, and related technologies for device identification are described. In certain aspects, packet data associated with a device can be analyzed and a score determined. The score and the threshold can be compared to determine a device identification for the device.
    Type: Application
    Filed: March 20, 2017
    Publication date: September 20, 2018
    Inventors: Yang Zhang, Siying Yang
  • Publication number: 20180248913
    Abstract: This document generally relates to systems, method, and other techniques for identifying and interfering with the operation of computer malware, as a mechanism for improving system security. Some implementations include a computer-implemented method by which a computer security server system performs actions including receiving a request for content directed to a particular content server system; forwarding the request to the particular content server system; receiving executable code from the particular content server system; inserting executable injection code into at least one file of the executable code; applying a security countermeasure to the combined executable code and executable injection code to create transformed code; and providing the transformed code to a client computing device.
    Type: Application
    Filed: August 30, 2016
    Publication date: August 30, 2018
    Inventors: Siying Yang, Jarrod Overson, Ben Vinegar, Bei Zhang
  • Patent number: 10033696
    Abstract: An intrusion detection system (“IDS”) device is described that includes a flow analysis module to receive a first packet flow from a client and to receive a second packet flow from a server. The IDS includes a forwarding component to send the first packet flow to the server and the second packet flow to the client and a stateful inspection engine to apply one or more sets of patterns to the first packet flow to determine whether the first packet flow represents a network attack. The IDS also includes an application identification module to perform an initial identification of a type of software application and communication protocol associated with the first packet flow and to reevaluate the identification of the type of software application and protocol according to the second packet flow. The IDS may help eliminate false positive and false negative attack identifications.
    Type: Grant
    Filed: July 14, 2017
    Date of Patent: July 24, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Bryan Burns, Siying Yang, Julien Sobrier
  • Publication number: 20180159751
    Abstract: Systems, methods, and related technologies for device classification are described. In certain aspects, traffic data associated with a device and data from an external system can be accessed. The data can be processed to determine a device classification for the device. An action can be initiated based on the classification.
    Type: Application
    Filed: December 6, 2016
    Publication date: June 7, 2018
    Inventors: Yang Zhang, Siying Yang
  • Publication number: 20180152436
    Abstract: Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for reliable identification of computing devices. The method can include receiving, by a computing system, a request from a computing device for an electronic resource. The computing system can identify a security token received from the device that made the request. Based on the security token, particular security countermeasures can be selected that are to be applied to the electronic resource to be served in response to the request. The countermeasures can be operable to interfere with an ability of malware to interact with the served electronic resource when the served electronic resource is on the computing device. Portions of the electronic resource that are to be executed on the computing device can be re-coded using the selected particular security countermeasures.
    Type: Application
    Filed: November 6, 2017
    Publication date: May 31, 2018
    Inventor: Siying Yang
  • Patent number: 9860210
    Abstract: An intrusion detection system is described that is capable of applying a plurality of stacked (layered) application-layer decoders to extract encapsulated application-layer data from a tunneled packet flow produced by multiple applications operating at the application layer, or layer seven (L7), of a network stack. In this way, the IDS is capable of performing application identification and decoding even when one or more software applications utilize other software applications as for data transport to produce packet flow from a network device. The protocol decoders may be dynamically swapped, reused and stacked (layered) when applied to a given packet or packet flow.
    Type: Grant
    Filed: October 26, 2016
    Date of Patent: January 2, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Siying Yang, Krishna Narayanaswamy
  • Patent number: 9825995
    Abstract: A computer-implemented method includes receiving, at a first server sub-system, content served to a client computing device; transcoding, with the first server sub-system, the received content using a policy received from a second security sub-system; determining, with the first server sub-system that the second server sub-system has likely ceased operating properly; receiving a request to vote on a leader server sub-system from one or more server sub-systems, and voting for from of the one or more server sub-systems; and subsequently transcoding received content according to a policy received from another of the server sub-systems that is not the second server sub-system.
    Type: Grant
    Filed: January 14, 2015
    Date of Patent: November 21, 2017
    Assignee: Shape Security, Inc.
    Inventors: Carl Schroeder, Justin D. Call, Siying Yang
  • Patent number: 9813444
    Abstract: Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for reliable identification of computing devices. The method can include receiving, by a computing system, a request from a computing device for an electronic resource. The computing system can identify a security token received from the device that made the request. Based on the security token, particular security countermeasures can be selected that are to be applied to the electronic resource to be served in response to the request. The countermeasures can be operable to interfere with an ability of malware to interact with the served electronic resource when the served electronic resource is on the computing device. Portions of the electronic resource that are to be executed on the computing device can be re-coded using the selected particular security countermeasures.
    Type: Grant
    Filed: February 25, 2016
    Date of Patent: November 7, 2017
    Assignee: Shape Security, Inc.
    Inventor: Siying Yang
  • Patent number: 9807113
    Abstract: This document generally relates to systems, method, and other techniques for identifying and interfering with the operation of computer malware, as a mechanism for improving system security. Some implementations include a computer-implemented method by which a computer security server system performs actions including receiving a request for content directed to a particular content server system; forwarding the request to the particular content server system; receiving executable code from the particular content server system; inserting executable injection code into at least one file of the executable code; applying a security countermeasure to the combined executable code and executable injection code to create transformed code; and providing the transformed code to a client computing device.
    Type: Grant
    Filed: August 31, 2015
    Date of Patent: October 31, 2017
    Inventors: Siying Yang, Jarrod Overson, Ben Vinegar, Bei Zhang
  • Patent number: 9712490
    Abstract: An intrusion detection system (“IDS”) device is described that includes a flow analysis module to receive a first packet flow from a client and to receive a second packet flow from a server. The IDS includes a forwarding component to send the first packet flow to the server and the second packet flow to the client and a stateful inspection engine to apply one or more sets of patterns to the first packet flow to determine whether the first packet flow represents a network attack. The IDS also includes an application identification module to perform an initial identification of a type of software application and communication protocol associated with the first packet flow and to reevaluate the identification of the type of software application and protocol according to the second packet flow. The IDS may help eliminate false positive and false negative attack identifications.
    Type: Grant
    Filed: October 15, 2012
    Date of Patent: July 18, 2017
    Assignee: Juniper Networks, Inc.
    Inventors: Bryan Burns, Siying Yang, Julien Sobrier
  • Publication number: 20170126627
    Abstract: Systems, methods, and other techniques for improving the operation of computing systems are described. Some implementations include a computer-implemented method. The method can include intercepting, at an intermediary computing system, messages communicated between a web server system and one or more client computing devices. A subset of the intercepted messages can be selected that are determined to commonly relate to a particular web transaction. The method can identify an expression pattern that occurs in the subset of the intercepted messages, and can determine that the identified expression pattern matches a first pre-defined expression pattern from among a plurality of different pre-defined expression patterns. A status of the particular web transaction can be determined based on the first pre-defined expression pattern that matches the identified expression pattern occurring in the subset of the intercepted messages.
    Type: Application
    Filed: October 28, 2015
    Publication date: May 4, 2017
    Inventors: Siying Yang, Justin D. Call
  • Publication number: 20170118241
    Abstract: A computer-implemented security method includes receiving, at a server sub-system, reports from a plurality of clients that were served content served by a web server system, the different versions of content varying from each other by polymorphic transformation that inserts varying content at common locations in the content; determining, with the server sub-system, an effectiveness level of security countermeasures applied to the content, using the received reports; selecting an updated security countermeasure package determined to address malware identified using data from the reports; and providing to the web server system information causing the web server system to switch to the updated security countermeasure package.
    Type: Application
    Filed: October 26, 2015
    Publication date: April 27, 2017
    Inventors: Justin D. Call, Ariya Hidayat, Timothy Dylan Peacock, Siying Yang
  • Publication number: 20170063923
    Abstract: This document generally relates to systems, method, and other techniques for identifying and interfering with the operation of computer malware, as a mechanism for improving system security. Some implementations include a computer-implemented method by which a computer security server system performs actions including receiving a request for content directed to a particular content server system; forwarding the request to the particular content server system; receiving executable code from the particular content server system; inserting executable injection code into at least one file of the executable code; applying a security countermeasure to the combined executable code and executable injection code to create transformed code; and providing the transformed code to a client computing device.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Inventors: Siying Yang, Jarrod Overson, Ben Vinegar, Bei Zhang
  • Patent number: 9582666
    Abstract: A computer system is configured to improve security of server computers interacting with client computers, and comprises: a memory, a processor coupled to the memory, and source code obfuscation logic coupled to the memory and the processor. The source code obfuscation logic is configured to read, from the memory, one or more original source code instructions that are configured to achieve an expected result when executed by a web browser on a client computer; to apply one or more obfuscation transformations, to the one or more original source code instructions, to produce one or more obfuscated source code instructions that are configured to achieve the same expected result when executed by the web browser but is expressed in an obfuscated format; to write the one or more obfuscated source code instructions to the memory.
    Type: Grant
    Filed: May 7, 2015
    Date of Patent: February 28, 2017
    Assignee: Shape Security, Inc.
    Inventors: Jarrod Overson, Siying Yang
  • Publication number: 20160359901
    Abstract: In an embodiment, a data processing system comprises one or more processors; script analysis logic coupled to the one or more processors and configured to obtain a particular electronic document from a server computer; script injection logic coupled to the one or more processors and configured to insert a set of script code into source code of the electronic document to result in producing a modified electronic document prior to providing the modified electronic document to a client computer; wherein the script code is configured to run upon loading in the client computer and to cause transforming, when running in the client computer, one or more values of one or more elements of the source code of the electronic document into obfuscated values of the one or more elements.
    Type: Application
    Filed: August 19, 2016
    Publication date: December 8, 2016
    Inventor: SIYING YANG