Patents by Inventor En-hui Yang
En-hui Yang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250086455Abstract: A system, method and computer program product for training a deep neural network. The deep neural network can be trained using a learning process that is defined to optimize both an error function of the deep neural network as well as a network mapping function of the deep neural network. The network mapping function can represent a predicted label distribution geometry property of the deep neural network. This learning process can improve the accuracy of the trained deep neural network model as well as its robustness again adversarial attacks. Optimizing the network mapping function can also provide increased insight into the operation of the trained deep neural network model, which may promote increased interpretability of the trained model and thus encourage uptake of the trained model.Type: ApplicationFiled: September 10, 2024Publication date: March 13, 2025Inventors: En-hui YANG, Shayan Mohajer HAMIDI, Linfeng YE, Renhao TAN
-
Publication number: 20240386275Abstract: A system, method and computer program product for training a deep neural network. The deep neural network can be trained to minimize an entropy constrained objective function that is defined to constrain the entropy of the weight parameters of the deep neural network. The objective function can be defined to jointly minimize the loss of the deep neural network in performing prediction functions and an entropy of the quantized weight parameters of the deep neural network. The objective function can be defined to also minimize the entropy of quantized activations of the deep neural network. This can provide an improved trade-off between the prediction accuracy of the deep neural network and the compression achievable when encoding the deep neural network.Type: ApplicationFiled: May 17, 2024Publication date: November 21, 2024Inventors: En-hui Yang, Shayan Mohajer Hamidi
-
Patent number: 12147583Abstract: A system, method and computer program product for protecting a deep neural network image classifier against receiving perturbed images. A plurality of watermark bits are embedded into an original digital image intended for the deep neural network image classifier. The watermarked image is transmitted through a potentially adversarial environment. A potentially perturbed image intended for the deep neural network image classifier is received from the potentially adversarial environment. The potentially perturbed image is determined to be an adversely modified or benign image by determining whether the potentially perturbed image includes a plurality of embedded bits matching the plurality of watermark bits embedded into the original digital image. The potentially perturbed image is prevented from being provided to the deep neural network image classifier in response to determining that the potentially perturbed image is the adversely modified image.Type: GrantFiled: April 13, 2022Date of Patent: November 19, 2024Assignee: BicDroid Inc.Inventors: En-hui Yang, Chen Sun
-
Patent number: 11822643Abstract: Method, device and computer program product for providing quarantined workspaces. A virtualization application operates on a host to simulate a virtual guest. A management application operates within the virtual guest. The management application controls transmission between guest applications and locations external to the virtual guest. The management application stores encryption keys inaccessible to the host. The management application intercepts attempted transmissions from guest applications to locations outside the virtual guest. Secure data files are identified in the attempted transmissions and encrypted before leaving the virtual guest using the encryption keys. The management application also prevents any unencrypted data from being provided to non-kernel host processes that have not been previously identified as permitted host processes while allowing unencrypted data transmission from the non-kernel host processes to any of the guest application processes.Type: GrantFiled: February 3, 2021Date of Patent: November 21, 2023Assignee: BICDROID INC.Inventors: En-Hui Yang, Rodney M. Ruddock, Jin Meng, Xiang Yu
-
Patent number: 11693981Abstract: Systems and method are provided for data self-protection. The systems and methods may involve installing a sentry on a computer system, the sentry including a file system filter installed on a kernel of that computer system; providing a central sentry platform in communication with the sentry, operating the central sentry platform to send a data self-protection policy to the sentry, the data self-protection policy being encrypted so that it can only be modified by the central sentry platform; operating the file system filter to control access to encrypted data stored on the computer system, by, for each process making a file access request to the encrypted data, the file system filter receiving and handling that file access request according to the data self-protection policy; and, operating the central sentry platform to monitor the sentry and to receive information from the sentry regarding access to the encrypted data.Type: GrantFiled: September 8, 2020Date of Patent: July 4, 2023Assignee: BICDROID INC.Inventors: Xiang Yu, En-hui Yang, Jin Meng
-
Patent number: 11533167Abstract: Method, device and computer program product for managing a plurality of encryption keys using a keystore seed that defines a seed bit set. A key management process defines a key mapping between the seed bit set and the plurality of encryption keys. The key management process enables each encryption key to be generated from the seed bit set using a corresponding keying material value and the key mapping. The key mapping specifies that an encryption key is generated by partitioning the seed bit set into a plurality of seed bit partitions, determining a keying value from the keying material value, determining a key sequence using the plurality of seed bit partitions and the keying value, and determining the encryption key from the key sequence. Management of a large number of encryption keys can be simplified through indirect management via the keystore seed and the key management process.Type: GrantFiled: May 21, 2020Date of Patent: December 20, 2022Assignee: BICDROID INC.Inventor: En-Hui Yang
-
Patent number: 11528142Abstract: The described embodiments relate to data protection methods, systems, and computer program products. A process-based encrypted data access policing system is proposed based on methods of encrypted data file management, process authentication and authorization, Trojan detection for authorized processes, encryption key generation and caching, and encrypted-file cache management. The process-based encrypted data access policing system may be implemented as a kernel level file system filter and a user-mode filter companion application, which polices the reading/writing of encrypted data in either a server system or an endpoint computer and protects data from data breaches and known or unknown attacks including ransomware and/or phishing attacks.Type: GrantFiled: October 10, 2017Date of Patent: December 13, 2022Assignee: BICDROID INC.Inventors: En-Hui Yang, Xiang Yu, Jin Meng
-
Publication number: 20220343026Abstract: A system, method and computer program product for protecting a deep neural network image classifier against receiving perturbed images. A plurality of watermark bits are embedded into an original digital image intended for the deep neural network image classifier. The watermarked image is transmitted through a potentially adversarial environment. A potentially perturbed image intended for the deep neural network image classifier is received from the potentially adversarial environment. The potentially perturbed image is determined to be an adversely modified or benign image by determining whether the potentially perturbed image includes a plurality of embedded bits matching the plurality of watermark bits embedded into the original digital image. The potentially perturbed image is prevented from being provided to the deep neural network image classifier in response to determining that the potentially perturbed image is the adversely modified image.Type: ApplicationFiled: April 13, 2022Publication date: October 27, 2022Inventors: En-hui Yang, Chen Sun
-
Patent number: 11126754Abstract: An access control system includes a processor configured to provide a trusted execution environment isolated from a rich execution environment. A rich OS operates in the rich execution environment while a trusted OS operates in the trusted execution environment. A plurality of protected data files are stored in non-volatile memory. When a process requests access to a protected data file, the computer system can permit the requesting process to access the requested data file only if a validated application token is present that corresponds to the requesting process. An application token is generated for the associated application by: detecting initiation of a first process associated with the associated application; determining that a valid user code is available within the trusted execution environment; and generating the application token using the valid user code upon determining that the valid user code is available within the trusted execution environment.Type: GrantFiled: November 26, 2019Date of Patent: September 21, 2021Assignee: BICDROID INC.Inventors: Xiang Yu, Jin Meng, En-hui Yang
-
Patent number: 11093604Abstract: An access control system includes a processor configured to provide a trusted execution environment isolated from a rich execution environment. A rich OS operates in the rich execution environment while a trusted OS operates in the trusted execution environment. An access monitoring module operates within the kernel of the rich OS and a trusted application operates in the trusted OS. The access monitoring module intercepts file requests directed at the file systems of the rich OS, and forwards the file requests to the trusted application. The trusted application then evaluates whether the file request is permitted and provides the access monitoring module with a response. The access monitoring module forwards the request to the file system only if the trusted application approves the request.Type: GrantFiled: July 25, 2019Date of Patent: August 17, 2021Assignee: BicDroid Inc.Inventors: En-hui Yang, Jin Meng, Xiang Yu, Hongtao Zhang, Tomas Szuchewycz
-
Publication number: 20210248227Abstract: Method, device and computer program product for providing quarantined workspaces. A virtualization application operates on a host to simulate a virtual guest. A management application operates within the virtual guest. The management application controls transmission between guest applications and locations external to the virtual guest. The management application stores encryption keys inaccessible to the host. The management application intercepts attempted transmissions from guest applications to locations outside the virtual guest. Secure data files are identified in the attempted transmissions and encrypted before leaving the virtual guest using the encryption keys. The management application also prevents any unencrypted data from being provided to non-kernel host processes that have not been previously identified as permitted host processes while allowing unencrypted data transmission from the non-kernel host processes to any of the guest application processes.Type: ApplicationFiled: February 3, 2021Publication date: August 12, 2021Inventors: En-Hui Yang, Rodney M. Ruddock, Jin Meng, Xiang Yu
-
Publication number: 20210073407Abstract: Systems and method are provided for data self-protection. The systems and methods may involve installing a sentry on a computer system, the sentry including a file system filter installed on a kernel of that computer system; providing a central sentry platform in communication with the sentry, operating the central sentry platform to send a data self-protection policy to the sentry, the data self-protection policy being encrypted so that it can only be modified by the central sentry platform; operating the file system filter to control access to encrypted data stored on the computer system, by, for each process making a file access request to the encrypted data, the file system filter receiving and handling that file access request according to the data self-protection policy; and, operating the central sentry platform to monitor the sentry and to receive information from the sentry regarding access to the encrypted data.Type: ApplicationFiled: September 8, 2020Publication date: March 11, 2021Applicant: BicDroid Inc.Inventors: Xiang Yu, En-hui Yang, Jin Meng
-
Publication number: 20200382290Abstract: Method, device and computer program product for managing a plurality of encryption keys using a keystore seed that defines a seed bit set. A key management process defines a key mapping between the seed bit set and the plurality of encryption keys. The key management process enables each encryption key to be generated from the seed bit set using a corresponding keying material value and the key mapping. The key mapping specifies that an encryption key is generated by partitioning the seed bit set into a plurality of seed bit partitions, determining a keying value from the keying material value, determining a key sequence using the plurality of seed bit partitions and the keying value, and determining the encryption key from the key sequence. Management of a large number of encryption keys can be simplified through indirect management via the keystore seed and the key management process.Type: ApplicationFiled: May 21, 2020Publication date: December 3, 2020Inventor: En-Hui Yang
-
Publication number: 20200175208Abstract: An access control system includes a processor configured to provide a trusted execution environment isolated from a rich execution environment. A rich OS operates in the rich execution environment while a trusted OS operates in the trusted execution environment. A plurality of protected data files are stored in non-volatile memory. When a process requests access to a protected data file, the computer system can permit the requesting process to access the requested data file only if a validated application token is present that corresponds to the requesting process. An application token is generated for the associated application by: detecting initiation of a first process associated with the associated application; determining that a valid user code is available within the trusted execution environment; and generating the application token using the valid user code upon determining that the valid user code is available within the trusted execution environment.Type: ApplicationFiled: November 26, 2019Publication date: June 4, 2020Inventors: Xiang Yu, Jin Meng, En-hui Yang
-
Publication number: 20200034528Abstract: An access control system includes a processor configured to provide a trusted execution environment isolated from a rich execution environment. A rich OS operates in the rich execution environment while a trusted OS operates in the trusted execution environment. An access monitoring module operates within the kernel of the rich OS and a trusted application operates in the trusted OS. The access monitoring module intercepts file requests directed at the file systems of the rich OS, and forwards the file requests to the trusted application. The trusted application then evaluates whether the file request is permitted and provides the access monitoring module with a response. The access monitoring module forwards the request to the file system only if the trusted application approves the request.Type: ApplicationFiled: July 25, 2019Publication date: January 30, 2020Inventors: En-hui Yang, Jin Meng, Xiang Yu, Hongtao Zhang, Tomas Szuchewycz
-
Publication number: 20180300327Abstract: The described embodiments relate to method and products for organizing a plurality of images. Specifically, the methods and products can automatically organize a plurality of images into a plurality of groups of images using allocation criteria. The allocation criteria for each image include a similarity distance between that image and at least one other image that measures how similar those images are. Each image can be allocated to at least one similar image group based on the similarity distance. The methods and products can also be used to visualize and display representative images for each of the groups of images.Type: ApplicationFiled: June 22, 2018Publication date: October 18, 2018Inventors: En-Hui Yang, Xiang Yu, Jin Meng
-
Patent number: 10031928Abstract: The described embodiments relate to method and products for organizing a plurality of images. Specifically, the methods and products can automatically organize a plurality of images into a plurality of groups of images using allocation criteria. The allocation criteria for each image include a similarity distance between that image and at least one other image that measures how similar those images are. Each image can be allocated to at least one similar image group based on the similarity distance. The methods and products can also be used to visualize and display representative images for each of the groups of images.Type: GrantFiled: July 2, 2015Date of Patent: July 24, 2018Assignee: BICDROID INC.Inventors: En-Hui Yang, Xiang Yu, Jin Meng
-
Patent number: 10026009Abstract: Systems, methods and computer program products for determining perceptual similarity between independent images are described. The described systems, methods and computer program products use a similarity distance to determine the perceptual similarity between a first image having a first arrangement of pixels and a second image having a second arrangement of pixels. A processor can determine a first image array corresponding to the first arrangement of pixels and a second image array corresponding of the second arrangement of pixels. The processor can generate a first pixel group set based on the first image array and a second pixel group set based on the second image array. A plurality of pixel group pairs can be generated, and each pixel group pair can be associated with a corresponding pixel group pair distortion. The similarity distance between the first image and the second image can be determined based on the plurality of pixel group pair distortions.Type: GrantFiled: May 31, 2016Date of Patent: July 17, 2018Assignee: BicDroid IncInventors: En-Hui Yang, Xiang Yu, Jin Meng
-
Publication number: 20180102902Abstract: The described embodiments relate to data protection methods, systems, and computer program products. A process-based encrypted data access policing system is proposed based on methods of encrypted data file management, process authentication and authorization, Trojan detection for authorized processes, encryption key generation and caching, and encrypted-file cache management. The process-based encrypted data access policing system may be implemented as a kernel level file system filter and a user-mode filter companion application, which polices the reading/writing of encrypted data in either a server system or an endpoint computer and protects data from data breaches and known or unknown attacks including ransomware and/or phishing attacks.Type: ApplicationFiled: October 10, 2017Publication date: April 12, 2018Inventors: En-Hui Yang, Xiang Yu, Jin Meng
-
Patent number: 9843341Abstract: Methods and devices for encoding a sparse signal x to generate a compressed encoded signal. The methods employ directionless grammar-based dimension coding. Using labelled subsets and the finding of disjoint repeated subsets in order to build a directionless grammar, the non-zero positions of the sparse signal are encoded in a directionless grammar-based dimension encoder. Element values are encoded in a conditional non-zero encoder. The coding process facilitates random access.Type: GrantFiled: August 2, 2017Date of Patent: December 12, 2017Assignee: Multicom Technologies Inc.Inventor: En-Hui Yang