Patents by Inventor Xiaohan Huang
Xiaohan Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230273990Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.Type: ApplicationFiled: February 25, 2022Publication date: August 31, 2023Applicant: Shape Security, Inc.Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Publication number: 20220185858Abstract: Provided are a genetically modified immune cell, a preparation method therefor, and an application. The immune cell overexpresses HIL-6 and/or L-GP130. HIL-6 or L-GP130 continuous overexpression/conditionally induced overexpression in the immune cell reduces the side effects of CAR-T therapy while maintaining immune and anti-tumour effects, and has potential value in the treatment of malignant tumours and AIDS.Type: ApplicationFiled: May 6, 2020Publication date: June 16, 2022Applicant: SHENZHEN IN VIVO BIOMEDICINE TECHNOLOGY LIMITED COMPANYInventors: Peng LI, Zhiwu JIANG, Zhaoyang TANG, Rui LIAO, Xiaohan HUANG, Simiao LIN, Suna WANG, Youguo LONG, Qiting WU, Yao YAO
-
Patent number: 11297097Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.Type: GrantFiled: December 29, 2019Date of Patent: April 5, 2022Assignee: SHAPE SECURITY, INC.Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Publication number: 20200177623Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.Type: ApplicationFiled: December 29, 2019Publication date: June 4, 2020Applicant: Shape Security, Inc.Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Patent number: 10536479Abstract: Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in response to a first request from the first client device. Instances of a particular programmatic element in the web code are identified. In response to the first request, modified web code is generated from the web code by consistently changing the particular programmatic element to a modified programmatic element throughout the web code. The modified web code is caused to be provided to the first client device in response to the first request from the first client device. A communication is received from the first client device that is made in response to the modified web code. The communication includes an attempt to interact with the particular programmatic element that exists in the web code but not in the modified web code.Type: GrantFiled: March 19, 2018Date of Patent: January 14, 2020Assignee: Shape Security, Inc.Inventors: Justin D Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Publication number: 20190243971Abstract: Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.Type: ApplicationFiled: December 27, 2018Publication date: August 8, 2019Applicant: Shape Security, Inc.Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Patent number: 10193909Abstract: Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.Type: GrantFiled: October 16, 2017Date of Patent: January 29, 2019Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Publication number: 20180270256Abstract: Techniques detecting the execution of alien content on a client computing device are provided. A set of web code is supplemented with a set of instrumentation code, which when executed at a client computing device, collects and reports information that describes execution of the set of web code at the client computing device, wherein the client computing device receives the set of web code and the set of instrumentation code. A set of information is received from the client computing device that is generated by the set of instrumentation code when the set of instrumentation code is executed at the client computing device. The presence of alien content interacting with the set of web code on the client computing device is determined based on the set of information.Type: ApplicationFiled: May 14, 2018Publication date: September 20, 2018Inventors: Justin D. Call, Subramanian Varadarajan, Xiaohan Huang, Xiaoming Zhou, Marc R. Hansen
-
Publication number: 20180212993Abstract: Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in response to a first request from the first client device. Instances of a particular programmatic element in the web code are identified. In response to the first request, modified web code is generated from the web code by consistently changing the particular programmatic element to a modified programmatic element throughout the web code. The modified web code is caused to be provided to the first client device in response to the first request from the first client device. A communication is received from the first client device that is made in response to the modified web code. The communication includes an attempt to interact with the particular programmatic element that exists in the web code but not in the modified web code.Type: ApplicationFiled: March 19, 2018Publication date: July 26, 2018Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Patent number: 9923919Abstract: A computer-implemented method for deflecting abnormal computer interactions includes receiving, at a computer server system and from a client computer device that is remote from the computer server system, a request for web content; identifying, by computer analysis of mark-up code content that is responsive to the request, executable code that is separate from, but programmatically related to, the mark-up code content; generating groups of elements in the mark-up code content and the related executable code by determining that the elements within particular groups are programmatically related to each other; modifying elements within particular ones of the groups consistently so as to prevent third-party code written to interoperate with the elements from modifying from interoperating with the modified elements, while maintain an ability of the modified elements within each group to interoperate with each other; and recoding the mark-up code content and the executable code to include the modified elements.Type: GrantFiled: August 10, 2015Date of Patent: March 20, 2018Assignee: Shape Security, Inc.Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Publication number: 20180041527Abstract: Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.Type: ApplicationFiled: October 16, 2017Publication date: February 8, 2018Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Patent number: 9794276Abstract: In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client.Type: GrantFiled: November 2, 2015Date of Patent: October 17, 2017Assignee: Shape Security, Inc.Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Publication number: 20160197945Abstract: In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client.Type: ApplicationFiled: November 2, 2015Publication date: July 7, 2016Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Patent number: 9225737Abstract: A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characterize the subsets of the particular document object models; and using the clusters to identify alien content on the particular client computers, wherein the alien content comprises content in the document object models that is not the result of content that is the basis of the document object model served.Type: GrantFiled: October 16, 2013Date of Patent: December 29, 2015Assignee: Shape Security, Inc.Inventors: Justin D. Call, Subramanian Varadarajan, Xiaohan Huang, Xiaoming Zhou, Marc R. Hansen
-
Publication number: 20150350243Abstract: A computer-implemented method for deflecting abnormal computer interactions includes receiving, at a computer server system and from a client computer device that is remote from the computer server system, a request for web content; identifying, by computer analysis of mark-up code content that is responsive to the request, executable code that is separate from, but programmatically related to, the mark-up code content; generating groups of elements in the mark-up code content and the related executable code by determining that the elements within particular groups are programmatically related to each other; modifying elements within particular ones of the groups consistently so as to prevent third-party code written to interoperate with the elements from modifying from interoperating with the modified elements, while maintain an ability of the modified elements within each group to interoperate with each other; and recoding the mark-up code content and the executable code to include the modified elements.Type: ApplicationFiled: August 10, 2015Publication date: December 3, 2015Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Patent number: 9178908Abstract: In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client.Type: GrantFiled: October 16, 2013Date of Patent: November 3, 2015Assignee: Shape Security, Inc.Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Patent number: 8869281Abstract: In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client.Type: GrantFiled: October 16, 2013Date of Patent: October 21, 2014Assignee: Shape Security, Inc.Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Publication number: 20140283068Abstract: In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client.Type: ApplicationFiled: October 16, 2013Publication date: September 18, 2014Applicant: Shape Security Inc.Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Publication number: 20140283067Abstract: A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characterize the subsets of the particular document object models; and using the clusters to identify alien content on the particular client computers, wherein the alien content comprises content in the document object models that is not the result of content that is the basis of the document object model served.Type: ApplicationFiled: October 16, 2013Publication date: September 18, 2014Applicant: Shape Security Inc.Inventors: Justin D. Call, Subramanian Varadarajan, Xiaohan Huang, Xiaoming Zhou, Marc R. Hansen
-
Publication number: 20140283069Abstract: In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client.Type: ApplicationFiled: October 16, 2013Publication date: September 18, 2014Applicant: Shape Security Inc.Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen