Patents by Inventor Wenke Lee

Wenke Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11874911
    Abstract: Example systems and methods for biometric authentication that can bridge fuzzy extractors with deep learning and achieve the goals of preserving privacy and providing recoverability from zero are disclosed. Embeddings comprising a face or speaker embedding in a non-Hamming distance space can be processed to create a personal reliable bit map and a reliable locality-sensitive hash (LSH) for mapping the non-Hamming distance space to a Hamming distance space. A fuzzy extractor can be applied to create metadata that can be stored on a computing device. A secret can be recovered from the metadata and can be used for identification.
    Type: Grant
    Filed: October 28, 2022
    Date of Patent: January 16, 2024
    Assignee: Georgia Tech Research Corporation
    Inventors: Pak Ho Chung, Wenke Lee, Erkam Uzun, Carter Yagemann
  • Publication number: 20230289469
    Abstract: An exemplary system and method are disclosed that provide the private querying of a biometric scan, such as a person's photo, against a private database such that the client issuing the private query learns only the identity of the query if it is in the database while the server performing the processing learns nothing of the biometric scan. The exemplary system and method conduct privacy-preserving searches over fuzzy databases via a fuzzy labeled set intersection (FLPSI) protocol. FLPSI protocol computes an intersection of noisy input sets to assess for closeness/similarity metrics in an efficient and optimized search.
    Type: Application
    Filed: July 15, 2021
    Publication date: September 14, 2023
    Inventors: Erkam Uzun, Alexandra Boldyreva, Pak Ho Chung, Vladimir Kolesnikov, Wenke Lee
  • Patent number: 11663307
    Abstract: Example systems and methods for defending against powerful, automated attacks on facial authentication systems are disclosed. A first verification is performed based at least in part on determining a response time for a response to a CAPTCHA or other challenge. In response to determining that the response time is within a threshold, a second verification is performed based at least in part on extracting a face feature or a voice feature from a plurality of samples associated with the response.
    Type: Grant
    Filed: September 24, 2019
    Date of Patent: May 30, 2023
    Assignee: GEORGIA TECH RESEARCH CORPORATION
    Inventors: Erkam Uzun, Pak Ho Chung, Irfan A. Essa, Wenke Lee
  • Publication number: 20230081988
    Abstract: Example systems and methods for biometric authentication that can bridge fuzzy extractors with deep learning and achieve the goals of preserving privacy and providing recoverability from zero are disclosed. Embeddings comprising a face or speaker embedding in a non-Hamming distance space can be processed to create a personal reliable bit map and a reliable locality-sensitive hash (LSH) for mapping the non-Hamming distance space to a Hamming distance space. A fuzzy extractor can be applied to create metadata that can be stored on a computing device. A secret can be recovered from the metadata and can be used for identification.
    Type: Application
    Filed: October 28, 2022
    Publication date: March 16, 2023
    Inventors: Pak Ho Chung, Wenke Lee, Erkam Uzun, Carter Yagemann
  • Patent number: 11494476
    Abstract: Example systems and methods for biometric authentication that can bridge fuzzy extractors with deep learning and achieve the goals of preserving privacy and providing recoverability from zero are disclosed. Embeddings comprising a face or speaker embedding in a non-Hamming distance space can be processed to create a personal reliable bit map and a reliable locality-sensitive hash (LSH) for mapping the non-Hamming distance space to a Hamming distance space. A fuzzy extractor can be applied to create metadata that can be stored on a computing device. A secret can be recovered from the metadata and can be used for identification.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: November 8, 2022
    Assignee: GEORGIA TECH RESEARCH CORPORATION
    Inventors: Pak Ho Chung, Wenke Lee, Erkam Uzun, Carter Yagemann
  • Patent number: 11036479
    Abstract: A method including: parsing a program to identify a plurality of features within the program; performing a first match of the plurality of features to a plurality of code files based on a hierarchical code index, the features corresponding to leaf nodes of the hierarchical code index and the code files corresponding to parent nodes of the leaf nodes; normalizing the first match results to weight against common features; performing a second match of the plurality of code files to one or more code repositories based on the hierarchical code index; normalizing the second match results to weight against common files; and identifying a code repository of the one or more code repositories as being included within the program.
    Type: Grant
    Filed: August 20, 2019
    Date of Patent: June 15, 2021
    Assignee: Georgia Tech Research Corporation
    Inventors: Ruian Duan, Ashish Bijlani, Taesoo Kim, Wenke Lee
  • Publication number: 20210034729
    Abstract: Example systems and methods for biometric authentication that can bridge fuzzy extractors with deep learning and achieve the goals of preserving privacy and providing recoverability from zero are disclosed. Embeddings comprising a face or speaker embedding in a non-Hamming distance space can be processed to create a personal reliable bit map and a reliable locality-sensitive hash (LSH) for mapping the non-Hamming distance space to a Hamming distance space. A fuzzy extractor can be applied to create metadata that can be stored on a computing device. A secret can be recovered from the metadata and can be used for identification.
    Type: Application
    Filed: April 12, 2019
    Publication date: February 4, 2021
    Inventors: Pak Ho Chung, Wenke Lee, Erkam Uzun, Carter Yagemann
  • Publication number: 20200097643
    Abstract: Example systems and methods for defending against powerful, automated attacks on facial authentication systems are disclosed. A first verification is performed based at least in part on determining a response time for a response to a CAPTCHA or other challenge. In response to determining that the response time is within a threshold, a second verification is performed based at least in part on extracting a face feature or a voice feature from a plurality of samples associated with the response.
    Type: Application
    Filed: September 24, 2019
    Publication date: March 26, 2020
    Inventors: Erkam Uzun, Pak Ho Chung, Irfan A. Essa, Wenke Lee
  • Publication number: 20200065074
    Abstract: A method including: parsing a program to identify a plurality of features within the program; performing a first match of the plurality of features to a plurality of code files based on a hierarchical code index, the features corresponding to leaf nodes of the hierarchical code index and the code files corresponding to parent nodes of the leaf nodes; normalizing the first match results to weight against common features; performing a second match of the plurality of code files to one or more code repositories based on the hierarchical code index; normalizing the second match results to weight against common files; and identifying a code repository of the one or more code repositories as being included within the program.
    Type: Application
    Filed: August 20, 2019
    Publication date: February 27, 2020
    Inventors: Ruian Duan, Ashish Bijlani, Taesoo Kim, Wenke Lee
  • Patent number: 10476888
    Abstract: Aspects of the disclosed technology include a method including identifying, by a computer device, a message; encoding, by the computer device, the message; receiving, by the computer device, a video of a user reciting the encoded message; and providing, by the computer device, the message and the video for verification an authenticity of the message.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: November 12, 2019
    Assignee: Georgia Tech Research Corporation
    Inventors: Simon Pak Ho Chung, Wenke Lee, Yeong Jin Jang
  • Patent number: 10257212
    Abstract: A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered. The real network NX domain names are utilized to create testing vectors. The testing vectors are classified as benign vectors or malicious vectors based on training vectors. The asset is then classified as infected if the NX testing vector created from the real network NX domain names is classified as a malicious vector.
    Type: Grant
    Filed: December 19, 2016
    Date of Patent: April 9, 2019
    Assignee: Help/Systems, LLC
    Inventors: Emmanouil Antonakakis, Robert Perdisci, Wenke Lee, Gunter Ollmann
  • Patent number: 10044748
    Abstract: A system and method for detecting a first network of compromised computers in a second network of computers, comprising: collecting Domain Name System (DNS) data for the second network; examining the collected data relative to DNS data from known comprised and/or uncompromised computers in the second network; and determining the existence of the first network and/or the identity of compromised computers in the second network based on the examination.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: August 7, 2018
    Assignees: Georgia Tech Research Corporation, Georgia Institute of Technology
    Inventors: David Dagon, Nick Feamster, Wenke Lee, Robert Edmonds, Richard Lipton, Anirudh Ramachandran
  • Patent number: 10027688
    Abstract: A method and system of detecting a malicious and/or botnet-related domain name, comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a network; searching for information about the domain name, the information related to: information about the domain name in a domain name white list and/or a domain name suspicious list; and information about the domain name using an Internet search engine, wherein the Internet search engine determines if there are no search results or search results with a link to at least one malware analysis site; and designating the domain name as malicious and/or botnet-related based on the information.
    Type: Grant
    Filed: August 10, 2009
    Date of Patent: July 17, 2018
    Assignee: Damballa, Inc.
    Inventors: Roberto Perdisci, Wenke Lee
  • Patent number: 9948671
    Abstract: A computerized system and method for performing behavioral clustering of malware samples, comprising: executing malware samples in a controlled computer environment for a predetermined time to obtain Hypertext Transfer Protocol. HTTP traffic; clustering the malware samples into at least one cluster based on network behavioral information from the HTTP traffic; and extracting, using the at least one processor, network signatures from the HTTP traffic information for each cluster, the network signatures being indicative of malware infection.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: April 17, 2018
    Assignee: Damballa, Inc.
    Inventors: Roberto Perdisci, Wenke Lee, Gunter Ollmann
  • Patent number: 9922190
    Abstract: System and method for detecting a domain generation algorithm (DGA), comprising: performing processing associated with clustering, utilizing a name-based features clustering module accessing information from an electronic database of NX domain information, the randomly generated domain names based on the similarity in the make-up of the randomly generated domain names; performing processing associated with clustering, utilizing a graph clustering module, the randomly generated domain names based on the groups of assets that queried the randomly generated domain names; performing processing associated with determining, utilizing a daily clustering correlation module and a temporal clustering correlation module, which clustered randomly generated domain names are highly correlated in daily use and in time; and performing processing associated with determining the DGA that generated the clustered randomly generated domain names.
    Type: Grant
    Filed: January 24, 2013
    Date of Patent: March 20, 2018
    Assignee: Damballa, Inc.
    Inventors: Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, II
  • Publication number: 20170279815
    Abstract: Aspects of the disclosed technology include a method including identifying, by a computer device, a message; encoding, by the computer device, the message; receiving, by the computer device, a video of a user reciting the encoded message; and providing, by the computer device, the message and the video for verification an authenticity of the message.
    Type: Application
    Filed: March 23, 2017
    Publication date: September 28, 2017
    Inventors: Simon Pak Ho Chung, Wenke Lee, Yeong Jin Jang
  • Publication number: 20170201536
    Abstract: A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered. The real network NX domain names are utilized to create testing vectors. The testing vectors are classified as benign vectors or malicious vectors based on training vectors. The asset is then classified as infected if the NX testing vector created from the real network NX domain names is classified as a malicious vector.
    Type: Application
    Filed: December 19, 2016
    Publication date: July 13, 2017
    Applicant: DAMBALLA, INC.
    Inventors: Emmanouil ANTONAKAKIS, Robert PERDISCI, Wenke LEE, Gunter OLLMANN
  • Patent number: 9686291
    Abstract: A method and system for detecting a malicious domain name, comprising: collecting domain name statistical information from a non-recursive domain name system name server (RDNS NS); and utilizing the collected domain name statistical information to determine if a domain name is malicious or benign.
    Type: Grant
    Filed: December 4, 2013
    Date of Patent: June 20, 2017
    Assignee: Damballa, Inc.
    Inventors: Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, II
  • Patent number: 9659189
    Abstract: The disclosed technology includes techniques for improving data privacy in mobile communications over public cloud services. According to certain implementations, a novel conceptual layer may be interposed between the “application” layer and the “user” layer. In some implementations, the conceptual layer may be at least partially embodied by a transparent window or pane overlaid on top of existing app graphical user interfaces to: (1) intercept plaintext user input before transforming the input and feeding it to an underlying app; and (2) reverse transform output data from the app before displaying the plaintext data to the user. Accordingly, the conceptual layer may serve as a protective layer while preserving the original application workflow and look-and-feel.
    Type: Grant
    Filed: October 14, 2014
    Date of Patent: May 23, 2017
    Assignee: Georgia Tech Research Corporation
    Inventors: Wenke Lee, Alexandra Boldyreva, Chung Pak Ho, Billy Lau, Chengyu Song
  • Patent number: 9525699
    Abstract: A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered. The real network NX domain names are utilized to create testing vectors. The testing vectors are classified as benign vectors or malicious vectors based on training vectors. The asset is then classified as infected if the NX testing vector created from the real network NX domain names is classified as a malicious vector.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: December 20, 2016
    Assignee: Damballa, Inc.
    Inventors: Emmanouil Antonakakis, Robert Perdisci, Wenke Lee, Gunter Ollmann