Patents Assigned to NeuShield, Inc.
-
Patent number: 12242607Abstract: A computer implemented cyber security method for preventing and removing undesired modifications of a protected file may include: generating a virtual file object via an authorized handler associated with the protected file, and when a write request to the protected file is received, the write request is redirected to the virtual file object causing the write request to store the change to the data of the protected file as data in the virtual file object; receiving a read request of the protected file; determining if there is data on the virtual file object associated with the protected file; and determining if the data on the virtual file object comprises a change to the data of the protected file; and, based on the determination, the authorized handler returns one of: (i) the data of the protected file changed by the write request and (ii) the data of the protected file unchanged by the write request.Type: GrantFiled: July 25, 2022Date of Patent: March 4, 2025Assignee: NeuShield, Inc.Inventors: Fei Qi, Yuen Pin Yeap
-
Patent number: 12026266Abstract: A computer implemented method to provide encrypted protected data in response to an unauthorized access request and unencrypted protected data in response to an authorized access request may include the following steps: receiving a first access request for accessing protected data; determining if the first access request identifies the protected data through a specified namespace; and returning an encrypted version of the protected data in response to the first access request if the first access request did not identify the protected data through the specified namespace. Optionally, the method may include the steps of: receiving a second access request to access the protected data; determining if the second access request identifies the protected data through the specified namespace; and returning an unencrypted version of the protected data in response to the second access request only if the second access request identifies the protected data through the specified namespace.Type: GrantFiled: December 21, 2021Date of Patent: July 2, 2024Assignee: NeuShield, Inc.Inventor: Fei Qi
-
Publication number: 20220358216Abstract: A computer implemented cyber security method for preventing and removing undesired modifications of a protected file may include: generating a virtual file object via an authorized handler associated with the protected file, and when a write request to the protected file is received, the write request is redirected to the virtual file object causing the write request to store the change to the data of the protected file as data in the virtual file object; receiving a read request of the protected file; determining if there is data on the virtual file object associated with the protected file; and determining if the data on the virtual file object comprises a change to the data of the protected file; and, based on the determination, the authorized handler returns one of: (i) the data of the protected file changed by the write request and (ii) the data of the protected file unchanged by the write request.Type: ApplicationFiled: July 25, 2022Publication date: November 10, 2022Applicant: NeuShield, Inc.Inventors: Fei Qi, Yuen Pin Yeap
-
Patent number: 11423165Abstract: In some embodiments, a cyber security method for preventing unauthorized file modification by malicious software and the like, the file accessible to an authorized handler may include: receiving a first access request from a program, the first access request having a first instruction set for modifying data of the file; determining if the file is associated with the authorized handler; processing the first instruction set to produce first modification data; and generating an initial virtual file object comprising the first modification data. In further embodiments, a cyber security method for preventing unauthorized file modification by malicious software and the like, the file accessible to an authorized handler may include: processing an instruction set for modifying a file to produce modification data; generating a virtual file object comprising the modification data; and associating the virtual file object with the file by identifying the file as a sparse file.Type: GrantFiled: July 22, 2020Date of Patent: August 23, 2022Assignee: NeuShield, Inc.Inventors: Fei Qi, Yuen Pin Yeap
-
Patent number: 11307950Abstract: A data health monitoring system and method are provided which may be configured to monitor different indicators or parameters of a computing device which may affect the health of the computing device, such as which may be used in looking for early warning signs that could indicate future data loss or corruption. The system may periodically query certain data health indicators, such as S.M.A.R.T. status, disk temperature, read and write errors, etc. The system may also monitor data as it is being accessed keeping track of other indicators such as: files that are modified, when the last backed up was, protection status of the file, type of changes made to the file, which application is making changes, etc. Preferably, the combined status of each data health indicator may be rolled up into a simple message and shown to the user via notifications, reports, logs or a user interface.Type: GrantFiled: March 28, 2021Date of Patent: April 19, 2022Assignee: NeuShield, Inc.Inventors: Elisha Riedlinger, Fei Qi, Yuen Pin Yeap
-
Publication number: 20210216424Abstract: A data health monitoring system and method are provided which may be configured to monitor different indicators or parameters of a computing device which may affect the health of the computing device, such as which may be used in looking for early warning signs that could indicate future data loss or corruption. The system may periodically query certain data health indicators, such as S.M.A.R.T. status, disk temperature, read and write errors, etc. The system may also monitor data as it is being accessed keeping track of other indicators such as: files that are modified, when the last backed up was, protection status of the file, type of changes made to the file, which application is making changes, etc. Preferably, the combined status of each data health indicator may be rolled up into a simple message and shown to the user via notifications, reports, logs or a user interface.Type: ApplicationFiled: March 28, 2021Publication date: July 15, 2021Applicant: NeuShield, Inc.Inventors: Elisha Riedlinger, Fei Qi, Yuen Pin Yeap
-
Patent number: 10983893Abstract: A data health monitoring system and method are provided which may be configured to monitor different indicators of a computing device which may affect the health of data, looking for early warning signs that could indicate future data loss or corruption. The system may periodically query certain data health indicators, such as S.M.A.R.T. status, disk temperature, read and write errors, etc. The system may also monitor data as it is being accessed keeping track of other indicators such as: files that are modified, when the last backed up was, protection status of the file, type of changes made to the file, which application is making changes, etc. Preferably, the combined status of each data health indicator may be rolled up into a simple message and shown to the user via notifications, reports, logs or a user interface.Type: GrantFiled: February 8, 2019Date of Patent: April 20, 2021Assignee: NEUSHIELD, INC.Inventors: Elisha Riedlinger, Fei Qi, Yuen Pin Yeap
-
Publication number: 20200349269Abstract: In some embodiments, a cyber security method for preventing unauthorized file modification by malicious software and the like, the file accessible to an authorized handler may include: receiving a first access request from a program, the first access request having a first instruction set for modifying data of the file; determining if the file is associated with the authorized handler; processing the first instruction set to produce first modification data; and generating an initial virtual file object comprising the first modification data. In further embodiments, a cyber security method for preventing unauthorized file modification by malicious software and the like, the file accessible to an authorized handler may include: processing an instruction set for modifying a file to produce modification data; generating a virtual file object comprising the modification data; and associating the virtual file object with the file by identifying the file as a sparse file.Type: ApplicationFiled: July 22, 2020Publication date: November 5, 2020Applicant: NeuShield, Inc.Inventors: Fei Qi, Yuen Pin Yeap