Patents by Inventor Wing Kwong Wan

Wing Kwong Wan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230351045
    Abstract: Generally discussed herein are devices, systems, and methods for scan surface reduction in sensitive information scanning. A method can include receiving a document, determining, by an evidence checker, a keyword that indicates sensitive information of a sensitive information type, is present in the document, responsive to determining the keyword is present, determining, by a sensitive information scanner and based on a regular expression associated with the sensitive information type, that sensitive information is present in the document, and performing a sensitive information mitigation operation to mitigate the sensitive information.
    Type: Application
    Filed: April 29, 2022
    Publication date: November 2, 2023
    Inventors: Assefa SEMEGN, Wing Kwong WAN, Liye XU
  • Patent number: 11159551
    Abstract: The described technologies leverage a trained evaluation function to analyze an email message to determine if a password is included in the text of the email message. The text of the email message may be vectorized using a character lookup table including vector values for each ASCII character. The trained evaluation function analyzes the vectorized text to determine if a password is included in the text of the mail message. An email message found to include a password may be placed in a quarantine storage to at least temporality prevent the email message from being disseminated to a recipient.
    Type: Grant
    Filed: April 19, 2019
    Date of Patent: October 26, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Richard P. Lewis, Arvindnarayanan Ravi, Daniel L. Mace, Jordan Wesley Rogers, Manas George, Wing Kwong Wan, Yogesh K. Roy
  • Publication number: 20200336501
    Abstract: The described technologies leverage a trained evaluation function to analyze an email message to determine if a password is included in the text of the email message. The text of the email message may be vectorized using a character lookup table including vector values for each ASCII character. The trained evaluation function analyzes the vectorized text to determine if a password is included in the text of the mail message. An email message found to include a password may be placed in a quarantine storage to at least temporality prevent the email message from being disseminated to a recipient.
    Type: Application
    Filed: April 19, 2019
    Publication date: October 22, 2020
    Inventors: Richard P. LEWIS, Arvindnarayanan RAVI, Daniel L. MACE, Jordan Wesley ROGERS, Manas GEORGE, Wing Kwong WAN, Yogesh K. ROY
  • Patent number: 9785778
    Abstract: A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed into a format that is configured to execute in a hosted isolated computing environment. Directed execution of the at least one computer program is initiated, in the hosted isolated computing environment. Dynamic code vulnerabilities of the at least one computer program are detected, based on the directed execution.
    Type: Grant
    Filed: April 7, 2016
    Date of Patent: October 10, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Reza Arbabi, Wing Kwong Wan, George Raymond Derryberry, Jr., Michael C. Fanning
  • Publication number: 20160300066
    Abstract: A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed into a format that is configured to execute in a hosted isolated computing environment. Directed execution of the at least one computer program is initiated, in the hosted isolated computing environment. Dynamic code vulnerabilities of the at least one computer program are detected, based on the directed execution.
    Type: Application
    Filed: April 7, 2016
    Publication date: October 13, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Reza Arbabi, Wing Kwong Wan, George Raymond Derryberry, JR., Michael C. Fanning
  • Patent number: 9317694
    Abstract: A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed into a format that is configured to execute in a hosted isolated computing environment. Directed execution of the at least one computer program is initiated, in the hosted isolated computing environment. Dynamic code vulnerabilities of the at least one computer program are detected, based on the directed execution.
    Type: Grant
    Filed: December 3, 2013
    Date of Patent: April 19, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Reza Arbabi, Wing Kwong Wan, George Raymond Derryberry, Jr., Michael C. Fanning
  • Patent number: 9262597
    Abstract: A request that includes an indication of an execution context and data that represents executable code is obtained. An analysis of the data is initiated based on generating a first templatized representation of the executable code. A list of clearance indicators that indicate a blocking status associated with respective forms of templatized representations is accessed. A workflow policy is determined based on the accessing of the list of clearance indicators. The list of clearance indicators is updated, based on a result of the analysis of the data.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: February 16, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Bala Neerumalla, Alain Comeau, Johann Rehberger, Graham Calladine, Wing Kwong Wan, George Raymond Derryberry, Jr., Michael C. Fanning, David A. Ross, Mark Cartwright
  • Publication number: 20150154402
    Abstract: A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed into a format that is configured to execute in a hosted isolated computing environment. Directed execution of the at least one computer program is initiated, in the hosted isolated computing environment. Dynamic code vulnerabilities of the at least one computer program are detected, based on the directed execution.
    Type: Application
    Filed: December 3, 2013
    Publication date: June 4, 2015
    Applicant: Microsoft Corporation
    Inventors: Reza Arbabi, Wing Kwong Wan, George Raymond Derryberry, JR., Michael C. Fanning
  • Publication number: 20140283096
    Abstract: A request that includes an indication of an execution context and data that represents executable code is obtained. An analysis of the data is initiated based on generating a first templatized representation of the executable code. A list of clearance indicators that indicate a blocking status associated with respective forms of templatized representations is accessed. A workflow policy is determined based on the accessing of the list of clearance indicators. The list of clearance indicators is updated, based on a result of the analysis of the data.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Bala Neerumalla, Alain Comeau, Johann Rehberger, Graham Calladine, Wing Kwong Wan, George Raymond Derryberry, JR., Michael C. Fanning, David A. Ross, Mark Cartwright