Patents by Inventor Chengi Jimmy Kuo

Chengi Jimmy Kuo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11405367
    Abstract: A method for improving security of peripheral devices is described. The method includes displaying, by a processor of a computing device, a code, receiving, by the processor, a user input after displaying the code, comparing, by the processor, the user input to the displayed code, and establishing, by the processor, secure communication between a peripheral device and a software application at the computing device based at least in part on a result of the comparing the user input to the displayed code.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: August 2, 2022
    Assignee: NortonLifeLock Inc.
    Inventors: Chengi Jimmy Kuo, Haik Mesropian, Petrus Johannes Viljoen, David Kane
  • Patent number: 11113152
    Abstract: A computer-implemented method for managing file backup may include (i) detecting, by a computing device, an attempt to upload a file to a backup storage, (ii) calculating a degree of difference between the file and a previous version of the file on the backup storage, (iii) comparing, by the computing device, a list of applications that have written to the file with a list of acceptable applications for the file, (iv) calculating, based on the degree of difference and the comparison of the list of applications, a change score for the file, and (v) applying, based on the change score, a backup policy to the attempt to upload the file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 19, 2017
    Date of Patent: September 7, 2021
    Assignee: NortonLifeLock Inc.
    Inventors: Mohit Jha, Vinith Raj, Chengi Jimmy Kuo, Amitrajit Banerjee
  • Patent number: 10489593
    Abstract: Mitigating malicious actions associated with graphical user interface elements may be performed by a computing device. A user interface element is monitored in a graphical user interface environment executing on the computing device. An association between the user interface element and a malicious action is determined. Access to the user interface element is blocked to prevent the malicious action.
    Type: Grant
    Filed: June 27, 2017
    Date of Patent: November 26, 2019
    Assignee: Symantec Corporation
    Inventors: Vinith Balakrishnan Raj, Chengi Jimmy Kuo, Joe Winifred Poobalarayen, Mohit Jha
  • Patent number: 10284530
    Abstract: A method for improving security of peripheral devices is described. In one embodiment, the method includes sending, by a processor of a peripheral device, at least one packet of data to an operating system of a computing device, identifying, by the processor, execution of a software application on the computing device, performing, by the processor, a handshake protocol between the secure input device and the software application based at least in part on the execution of the software application, and establishing, by the processor, a secure session over a secure channel between the secure input device and the software application based at least in part on the handshake protocol. In some cases, the at least one packet of data identifies the peripheral device to the operating system as two or more peripheral devices such as a default input device and a secure input device.
    Type: Grant
    Filed: July 13, 2017
    Date of Patent: May 7, 2019
    Assignee: Symantec Corporation
    Inventors: Chengi Jimmy Kuo, Haik Mesropian, Petrus Johannes Viljoen, David Kane
  • Patent number: 10185480
    Abstract: The disclosed computer-implemented method for automatically making selections in user interfaces may include (1) detecting, on a computing device, a user interface that comprises a prompt for a user of the computing device to select between a first option and a second option, (2) identifying a profile for making, on behalf of the user, a predetermined selection of one of the first option and the second option, (3) determining that the predetermined selection indicates that the first option should be selected on behalf of the user, and (4) selecting, from the prompt, the first option on behalf of the user. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: January 22, 2019
    Assignee: Symantec Corporation
    Inventors: Chengi Jimmy Kuo, Petrus Johannes Viljoen, Prasanth Ganesan, Dermot Wall, Dong Chung
  • Publication number: 20180373872
    Abstract: Mitigating malicious actions associated with graphical user interface elements may be performed by a computing device. A user interface element is monitored in a graphical user interface environment executing on the computing device. An association between the user interface element and a malicious action is determined. Access to the user interface element is blocked to prevent the malicious action.
    Type: Application
    Filed: June 27, 2017
    Publication date: December 27, 2018
    Inventors: Vinith Balakrishnan Raj, Chengi Jimmy Kuo, Joe Winifred Poobalarayen, Mohit Jha
  • Patent number: 9152202
    Abstract: Techniques for conserving battery power in devices are provided. One or more deferrable tasks are queued for later execution. An initiation of a subsequent charging event for a battery of the device is detected. The queued deferrable task(s) are enabled to be executed during the charging event. For instance, the queued deferrable task(s) may be enabled to be executed if the charging event is predicted to be a long duration charging event, such as by referring to a charging profile of the mobile device. In this manner, battery power is conserved while the device is in use and not connected to a battery charger.
    Type: Grant
    Filed: June 16, 2011
    Date of Patent: October 6, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Marc Seinfeld, Chengi Jimmy Kuo, Aaron Putnam, Jeff Williams
  • Patent number: 9015843
    Abstract: The subject disclosure is directed towards protecting against malware, by classifying a user's risk level, which corresponds to a likelihood of malware being activated. To make the classification, data is collected that represents a probability of encountering malware, a probability of a user activating that malware, and the impact to the machine is activated. The classification maps to a protection level, which may be dynamically adjustable, e.g., based upon current risk conditions. The protection level determines a way to mitigate possible damage, such as by running a program as a virtualized program, running a virtualized operating system, or sandboxing a process.
    Type: Grant
    Filed: December 3, 2010
    Date of Patent: April 21, 2015
    Assignee: Microsoft Corporation
    Inventors: Bryan C. Griffin, Vidyanand N. Rajpathak, Chengi Jimmy Kuo, Igal Figlin
  • Publication number: 20130152201
    Abstract: Described is a technology by which a malware-compromised machine, such as a personal computer is cleaned through the use of a functional adjunct machine, such as a mobile device (or vice-versa). The functional adjunct machine performs actions on behalf of the malware-compromised machine and/or to assist the remediation. This may include downloading antimalware-related data (e.g., an application, antimalware code, signature updates and/or the like) via a marketplace/application store, and transferring at least some of the data and/or programs to the compromised machine. Other actions may include using the functional adjunct machine to boot the malware-compromised machine into a non-compromised state and providing the data or programs to allow remediation of the malware while in this state.
    Type: Application
    Filed: December 12, 2011
    Publication date: June 13, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Vincent P. Gullotto, Kelsey Scott Molenkamp, Marc E. Seinfeld, Chengi Jimmy Kuo
  • Publication number: 20120324578
    Abstract: Techniques for conserving battery power in devices are provided. One or more deferrable tasks are queued for later execution. An initiation of a subsequent charging event for a battery of the device is detected. The queued deferrable task(s) are enabled to be executed during the charging event. For instance, the queued deferrable task(s) may be enabled to be executed if the charging event is predicted to be a long duration charging event, such as by referring to a charging profile of the mobile device. In this manner, battery power is conserved while the device is in use and not connected to a battery charger.
    Type: Application
    Filed: June 16, 2011
    Publication date: December 20, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Marc Seinfeld, Chengi Jimmy Kuo, Aaron Putnam, Jeff Williams
  • Patent number: 8214895
    Abstract: Aspects of the subject matter described herein relate to identifying good files and malware based on whitelists and blacklists. In aspects, a node starts a scan of files on a data store. In conjunction with starting the scan, the node creates a data structure that indicates the directories on the data store. The node sends the data structure to a whitelist server and a blacklist server and an indication of a last successful time of communication. The whitelist and blacklist servers respond to the node with information about any new files that have been added to the directories since the last successful communication. The node may subsequently use the information to identify known good files and malware.
    Type: Grant
    Filed: September 26, 2007
    Date of Patent: July 3, 2012
    Assignee: Microsoft Corporation
    Inventors: Chengi Jimmy Kuo, Jigar J. Mody
  • Publication number: 20120144492
    Abstract: The subject disclosure is directed towards protecting against malware, by classifying a user's risk level, which corresponds to a likelihood of malware being activated. To make the classification, data is collected that represents a probability of encountering malware, a probability of a user activating that malware, and the impact to the machine is activated. The classification maps to a protection level, which may be dynamically adjustable, e.g., based upon current risk conditions. The protection level determines a way to mitigate possible damage, such as by running a program as a virtualized program, running a virtualized operating system, or sandboxing a process.
    Type: Application
    Filed: December 3, 2010
    Publication date: June 7, 2012
    Applicant: Microsoft Corporation
    Inventors: Bryan C. Griffin, Vidyanand N. Rajpathak, Chengi Jimmy Kuo, Igal Figlin
  • Publication number: 20100169972
    Abstract: Various principles for maintaining a shared repository of authorization scanning results, which may be populated with results of authorization scans of particular files (and other content units) as well as a signature for those particular files. When a particular file is to be scanned by a client computing device to determine whether it contains unauthorized software, a signature for the file may be calculated and provided to the shared repository. If the repository has a result for that file—as indicated by a signature for the file being present in the repository—the result in the repository may be provided to the client computing device that issued the query, and the client computing device may accept the answer in the shared repository. If the result is not in the repository (i.e., the file has not been scanned), then the file may be scanned, and a result may be placed in the repository.
    Type: Application
    Filed: December 31, 2008
    Publication date: July 1, 2010
    Applicant: Microsoft Corporation
    Inventors: Chengi Jimmy Kuo, Marc Seinfeld, Jeff Williams
  • Publication number: 20090083852
    Abstract: Aspects of the subject matter described herein relate to identifying good files and malware based on whitelists and blacklists. In aspects, a node starts a scan of files on a data store. In conjunction with starting the scan, the node creates a data structure that indicates the directories on the data store. The node sends the data structure to a whitelist server and a blacklist server and an indication of a last successful time of communication. The whitelist and blacklist servers respond to the node with information about any new files that have been added to the directories since the last successful communication. The node may subsequently use the information to identify known good files and malware.
    Type: Application
    Filed: September 26, 2007
    Publication date: March 26, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Chengi Jimmy Kuo, Jigar J. Mody
  • Patent number: 7000250
    Abstract: A system, method and computer program product are provided for protecting a computer in an opened share mode. Initially, a computer is run on a network in an opened share mode. In operation, attempts to access the computer by applications are monitored. Further, it is determined whether the applications attempt to modify the computer. A security event is then executed in response to any attempt to modify the computer.
    Type: Grant
    Filed: July 26, 2001
    Date of Patent: February 14, 2006
    Assignee: McAfee, Inc.
    Inventors: Chengi Jimmy Kuo, Igor G. Muttik, Dmitry O. Gryaznov
  • Patent number: 6748534
    Abstract: A system and a method for performing partitioned scanning of a dataset for malware in a distributed computing environment is disclosed. A dataset is maintained in a plurality of structured databases in the distributed computing environment. Each database stores a plurality of data item groups which each include a plurality of individual data items. Each such data item is uniquely identified within the dataset by a data item identifier. A set of indices is stored in a centralized database. The set of indices includes a list of scanned data item identifiers for each data item within the dataset scanned for malware and a list of last entry numbers for each data item group stored in each database. Each last entry number corresponds to one such data item within the data item group last scanned for malware. A plurality of malware scanners are executed in substantial concurrency.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: June 8, 2004
    Assignee: Networks Associates
    Inventors: Dmitry O. Gryaznov, Chengi Jimmy Kuo
  • Patent number: 6230288
    Abstract: A method is provided for detecting computer viruses that infect text-based files. In accordance with a preferred embodiment, a collection of virus signatures reflecting sequences of characters or instructions known to be found in such viruses is maintained on a computer system. A virus detection program is also maintained for the purpose of comparing the contents of computer files to the virus signatures. Upon execution of the virus detection program, whitespace within text-based files is transformed such that each sequence of whitespace characters is replaced by a single whitespace character. Virus signatures of viruses known to infect text files are similarly transformed. A transformed text-based file is then searched for at least one of said virus signatures. The user is alerted to a possible virus infection if any of the virus signatures are found in a file.
    Type: Grant
    Filed: October 29, 1998
    Date of Patent: May 8, 2001
    Assignee: Network Associates, Inc.
    Inventors: Chengi Jimmy Kuo, Jivko Koltchev, Dao-Chen Zheng, Joseph Peter