Patents by Inventor Cuiping Yu

Cuiping Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240132911
    Abstract: Expression constructs and methods for recombinant parvovirus production are disclosed. In some embodiments, the expression construct encodes (1) adenovirus E4 and E2a proteins, (2) parvovirus proteins necessary for the production of the recombinant parvovirus, and (3) a recombinant parvovirus genome, thus allowing production of the recombinant parvovirus by transfecting a host cell with a single expression construct.
    Type: Application
    Filed: July 5, 2023
    Publication date: April 25, 2024
    Inventors: Qizhao WANG, Daozhan YU, Yu LIU, Cuiping CHEN, Rongze YANG
  • Publication number: 20230336570
    Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
    Type: Application
    Filed: June 28, 2023
    Publication date: October 19, 2023
    Inventors: Hui Ling, Cuiping Yu, Zhong Chen
  • Patent number: 11695784
    Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
    Type: Grant
    Filed: February 11, 2021
    Date of Patent: July 4, 2023
    Assignee: SONICWALL INC.
    Inventors: Hui Ling, Cuiping Yu, Zhong Chen
  • Publication number: 20210234873
    Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
    Type: Application
    Filed: February 11, 2021
    Publication date: July 29, 2021
    Inventors: Hui Ling, Cuiping Yu, Zhong Chen
  • Patent number: 11005858
    Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
    Type: Grant
    Filed: April 20, 2020
    Date of Patent: May 11, 2021
    Assignee: SONICWALL INC.
    Inventors: Hui Ling, Cuiping Yu, Zhong Chen
  • Publication number: 20200351280
    Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
    Type: Application
    Filed: April 20, 2020
    Publication date: November 5, 2020
    Inventors: Hui Ling, Cuiping Yu, Zhong Chen
  • Patent number: 10630697
    Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
    Type: Grant
    Filed: January 2, 2018
    Date of Patent: April 21, 2020
    Assignee: SONICWALL INC.
    Inventors: Hui Ling, Cuiping Yu, Zhong Chen
  • Publication number: 20180198804
    Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
    Type: Application
    Filed: January 2, 2018
    Publication date: July 12, 2018
    Inventors: Hui Ling, Cuiping Yu, Zhong Chen
  • Patent number: 10015145
    Abstract: Systems and methods are directed towards network data leakage prevention (DLP). More specifically, the systems and methods are directed towards using TCP (Transmission Control Protocol) data packets in conjunction with the DLP monitor. The network DLP utilizes TCP data packets to carry source user identity. With the source user identity, the DLP monitor can determine if sensitive data can be transmitted based on the provided user information and corresponding DLP policies for each user. Furthermore, the DLP monitor can determine if sensitive data can also be transmitted for particular users in situations where multiple users share the same IP address.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: July 3, 2018
    Assignee: SonicWALL Inc.
    Inventors: Hui Ling, Zhong Chen, Cuiping Yu, Zunping Cheng
  • Patent number: 9860259
    Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
    Type: Grant
    Filed: December 10, 2015
    Date of Patent: January 2, 2018
    Assignee: SONICWALL US HOLDINGS INC.
    Inventors: Hui Ling, Cuiping Yu, Zhong Chen
  • Publication number: 20170171222
    Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
    Type: Application
    Filed: December 10, 2015
    Publication date: June 15, 2017
    Inventors: Hui Ling, Cuiping Yu, Zhong Chen
  • Publication number: 20170041297
    Abstract: Systems and methods are directed towards network data leakage prevention (DLP). More specifically, the systems and methods are directed towards using TCP (Transmission Control Protocol) data packets in conjunction with the DLP monitor. The network DLP utilizes TCP data packets to carry source user identity. With the source user identity, the DLP monitor can determine if sensitive data can be transmitted based on the provided user information and corresponding DLP policies for each user. Furthermore, the DLP monitor can determine if sensitive data can also be transmitted for particular users in situations where multiple users share the same IP address.
    Type: Application
    Filed: August 5, 2015
    Publication date: February 9, 2017
    Inventors: Hui Ling, Zhong Chen, Cuiping Yu, Zun Ping Cheng