Patents by Inventor Cuiping Yu
Cuiping Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250016178Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: ApplicationFiled: September 17, 2024Publication date: January 9, 2025Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Patent number: 12095779Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: GrantFiled: June 28, 2023Date of Patent: September 17, 2024Assignee: SonicWALL Inc.Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Publication number: 20230336570Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: ApplicationFiled: June 28, 2023Publication date: October 19, 2023Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Patent number: 11695784Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: GrantFiled: February 11, 2021Date of Patent: July 4, 2023Assignee: SONICWALL INC.Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Publication number: 20210234873Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: ApplicationFiled: February 11, 2021Publication date: July 29, 2021Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Patent number: 11005858Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: GrantFiled: April 20, 2020Date of Patent: May 11, 2021Assignee: SONICWALL INC.Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Publication number: 20200351280Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: ApplicationFiled: April 20, 2020Publication date: November 5, 2020Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Patent number: 10630697Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: GrantFiled: January 2, 2018Date of Patent: April 21, 2020Assignee: SONICWALL INC.Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Publication number: 20180198804Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: ApplicationFiled: January 2, 2018Publication date: July 12, 2018Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Patent number: 10015145Abstract: Systems and methods are directed towards network data leakage prevention (DLP). More specifically, the systems and methods are directed towards using TCP (Transmission Control Protocol) data packets in conjunction with the DLP monitor. The network DLP utilizes TCP data packets to carry source user identity. With the source user identity, the DLP monitor can determine if sensitive data can be transmitted based on the provided user information and corresponding DLP policies for each user. Furthermore, the DLP monitor can determine if sensitive data can also be transmitted for particular users in situations where multiple users share the same IP address.Type: GrantFiled: August 5, 2015Date of Patent: July 3, 2018Assignee: SonicWALL Inc.Inventors: Hui Ling, Zhong Chen, Cuiping Yu, Zunping Cheng
-
Patent number: 9860259Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: GrantFiled: December 10, 2015Date of Patent: January 2, 2018Assignee: SONICWALL US HOLDINGS INC.Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Publication number: 20170171222Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.Type: ApplicationFiled: December 10, 2015Publication date: June 15, 2017Inventors: Hui Ling, Cuiping Yu, Zhong Chen
-
Publication number: 20170041297Abstract: Systems and methods are directed towards network data leakage prevention (DLP). More specifically, the systems and methods are directed towards using TCP (Transmission Control Protocol) data packets in conjunction with the DLP monitor. The network DLP utilizes TCP data packets to carry source user identity. With the source user identity, the DLP monitor can determine if sensitive data can be transmitted based on the provided user information and corresponding DLP policies for each user. Furthermore, the DLP monitor can determine if sensitive data can also be transmitted for particular users in situations where multiple users share the same IP address.Type: ApplicationFiled: August 5, 2015Publication date: February 9, 2017Inventors: Hui Ling, Zhong Chen, Cuiping Yu, Zun Ping Cheng