Patents by Inventor Danfeng Yao

Danfeng Yao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230269264
    Abstract: The main enabler of the technology is the probabilistic programming based computation strategies that have an outstanding ability to handle uncertainties in discovering anomalous patterns. This new capability to handle uncertainties is particularly relevant for detecting insider threats, as there are usually no clearly defined rules and policies. An insider's behaviors would deviate from normally distributed events and actions in various aspects. The probabilistic model detects this deviation and explains the computational path of the deviation. The result interpretation unit enables organizations to investigate the causes with high accuracy, avoiding costly and embarrassing false alarms. The technology detects and ranks abnormal events. This ranking capability helps prioritize follow-up manual investigation.
    Type: Application
    Filed: June 14, 2021
    Publication date: August 24, 2023
    Inventors: Danfeng Yao, Md Salman Ahmed, Ya Xiao
  • Patent number: 9888030
    Abstract: A computer system for distinguishing user-initiated network traffic from malware-initiated network traffic comprising at least one central processing unit (CPU) and a memory communicatively coupled to the CPU. The memory includes a program code executable by the CPU to monitor individual network events to determine for an individual network event whether the event has a legitimate root-trigger. Malware-initiated traffic is identified as an individual network event that does not have a legitimate root-trigger.
    Type: Grant
    Filed: May 1, 2014
    Date of Patent: February 6, 2018
    Assignee: Virginia Tech Intellectual Properties, Inc.
    Inventors: Danfeng Yao, Hao Zhang
  • Publication number: 20140310808
    Abstract: A computer system for distinguishing user-initiated network traffic from malware-initiated network traffic comprising at least one central processing unit (CPU) and a memory communicatively coupled to the CPU. The memory includes a program code executable by the CPU to monitor individual network events to determine for an individual network event whether the event has a legitimate root-trigger. Malware-initiated traffic is identified as an individual network event that does not have a legitimate root-trigger.
    Type: Application
    Filed: May 1, 2014
    Publication date: October 16, 2014
    Inventors: Danfeng Yao, Hao Zhang
  • Patent number: 8763127
    Abstract: A system and method for distinguishing human input events from malware-generated events includes one or more central processing units (CPUs), one or more input devices and memory. The memory includes program code that when executed by the CPU causes the CPU to obtain a first set of input events from a user utilizing the input device. The first input events are used to obtain or derive a feature indicative of the user, such as a multi-dimensional feature vector as provided by a support vector machine. Second input events are then obtained, and the second input events are classified against the feature to determine if either the user or malware initiated the second input events.
    Type: Grant
    Filed: March 13, 2010
    Date of Patent: June 24, 2014
    Assignee: Rutgers, The State University of New Jersey
    Inventors: Danfeng Yao, Deian Stefan, Chehai Wu
  • Patent number: 8266439
    Abstract: One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: September 11, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao
  • Publication number: 20110320816
    Abstract: A system and method for distinguishing human input events from malware-generated events includes one or more central processing units (CPUs), one or more input devices and memory. The memory includes program code that when executed by the CPU causes the CPU to obtain a first set of input events from a user utilizing the input device. The first input events are used to obtain or derive a feature indicative of the user, such as a multi-dimensional feature vector as provided by a support vector machine. Second input events are then obtained, and the second input events are classified against the feature to determine if either the user or malware initiated the second input events.
    Type: Application
    Filed: March 13, 2010
    Publication date: December 29, 2011
    Applicant: Rutgers, The State University of New Jersey
    Inventors: Danfeng Yao, Deian Stefan, Chehai Wu
  • Publication number: 20090070361
    Abstract: One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.
    Type: Application
    Filed: September 12, 2007
    Publication date: March 12, 2009
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Stuart HABER, William G. HORNE, Tomas SANDER, Danfeng YAO