Patents by Inventor Erkang Zheng

Erkang Zheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10740469
    Abstract: Methods and apparatuses are described for automated secure software development management, risk assessment and risk remediation. A server generates security requirements for a software application under development based upon a plurality of technical attributes and a threat model. The server creates a first set of development tasks based upon the generated security requirements. The server scans source code to identify one or more security vulnerabilities and creates a second set of development tasks based upon the identified vulnerabilities. The server generates a security risk score based upon the generated security requirements and the identified vulnerabilities. The server deploys the software application under development to a production computing system upon determining that the security risk score satisfies a criterion.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: August 11, 2020
    Assignee: FMR LLC
    Inventors: Erkang Zheng, Jason Kao, Bingrong He
  • Patent number: 10601800
    Abstract: A computer-implemented method is provided for authenticating an identity of a user requesting access to a computerized resource via a client computing device. The method includes receiving, by the client computing device, a request to authenticate the identity of the user, determining, by the client computing device, a time period of the request, determining, by the client computing device, an approximate geolocation of the user, and determining, by the client computing device, one or more network characteristics associated with a current network of the client computing device. The method further includes transmitting, by the client computing device to an authentication device, authentication data including the request, the time period of the request, the approximate geolocation of the user and the one or network characteristics.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: March 24, 2020
    Assignee: FMR LLC
    Inventors: Jason Kao, Erkang Zheng
  • Patent number: 10503907
    Abstract: A computer-implemented system is provided for visualizing and analyzing security threats in a suite of software applications. The system includes a visualization module for rendering, on a computer display, a map with components representative of the suite of software applications and relationships among the software applications. The components are displayed in a base layer of the map. The system also includes a threat modeling module configured to automatically identify one or more security threats in the suite of software applications. The threat modeling module is adapted to interact with the visualization module to graphically depict on the computer display the one or more security threats on the map in a threat modeling layer. The system further includes a security controls module configured to implement security controls for mitigating the one or more security threats identified by the threat modeling module.
    Type: Grant
    Filed: December 14, 2016
    Date of Patent: December 10, 2019
    Assignee: FMR LLC
    Inventors: Erkang Zheng, Jason Kao
  • Publication number: 20190205542
    Abstract: Methods and apparatuses are described for automated secure software development management, risk assessment and risk remediation. A server generates security requirements for a software application under development based upon a plurality of technical attributes and a threat model. The server creates a first set of development tasks based upon the generated security requirements. The server scans source code to identify one or more security vulnerabilities and creates a second set of development tasks based upon the identified vulnerabilities. The server generates a security risk score based upon the generated security requirements and the identified vulnerabilities. The server deploys the software application under development to a production computing system upon determining that the security risk score satisfies a criterion.
    Type: Application
    Filed: December 28, 2017
    Publication date: July 4, 2019
    Inventors: Jason Kao, Bingrong He, Erkang Zheng
  • Patent number: 10244113
    Abstract: Methods and apparatuses are described for determining customer service quality through digitized voice characteristic measurement and filtering. A voice analysis module captures a first digitized voice segment corresponding to speech submitted by a user of a remote device. The voice analysis module extracts a first set of voice features from the first voice segment, and determines an emotion level of the user based upon the first set of voice features. The voice analysis module captures a second digitized voice segment corresponding to speech submitted by the user. The voice analysis module extracts a second set of voice features from the second voice segment, and determines a change in the emotion level of the user by comparing the first set of voice features to the second set of voice features. The module normalizes the change in the emotion level of the user using emotion influence factors, and generates a service score.
    Type: Grant
    Filed: April 26, 2016
    Date of Patent: March 26, 2019
    Assignee: FMR LLC
    Inventors: Jason Kao, Xinxin Sheng, Bahram Omidfar, Erkang Zheng
  • Patent number: 10068082
    Abstract: Systems and methods for enabling multi-factor authentication for a web-based account. A first computing device and a second computing device are accessible to a first user. A backend system is accessible to a second user. The backend system communicates with the second computing device via a secure communication network. The first user creates a web-based account and receives a MFA initiation screen including secret information and a field for entering at least one TOTP token. The backend system has a TOTP token generator. The second computing device captures the secret information and transmits it to the backend system. The second user generates at least one TOTP token using the backend system and transmits the at least one TOTP token to the second computing device. The first user enters the at least one TOTP token into the first computing device. The account can then be validated and MFA enabled.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: September 4, 2018
    Assignee: FMR LLC
    Inventors: Erkang Zheng, Jason Jay Kao, Paul Michael Vetrano
  • Publication number: 20180248863
    Abstract: A computer-implemented method is provided for authenticating an identity of a user requesting access to a computerized resource via a client computing device. The method includes receiving, by the client computing device, a request to authenticate the identity of the user, determining, by the client computing device, a time period of the request, determining, by the client computing device, an approximate geolocation of the user, and determining, by the client computing device, one or more network characteristics associated with a current network of the client computing device. The method further includes transmitting, by the client computing device to an authentication device, authentication data including the request, the time period of the request, the approximate geolocation of the user and the one or network characteristics.
    Type: Application
    Filed: February 24, 2017
    Publication date: August 30, 2018
    Inventors: Jason Kao, Erkang Zheng
  • Publication number: 20170310820
    Abstract: Methods and apparatuses are described for determining customer service quality through digitized voice characteristic measurement and filtering. A voice analysis module captures a first digitized voice segment corresponding to speech submitted by a user of a remote device. The voice analysis module extracts a first set of voice features from the first voice segment, and determines an emotion level of the user based upon the first set of voice features. The voice analysis module captures a second digitized voice segment corresponding to speech submitted by the user. The voice analysis module extracts a second set of voice features from the second voice segment, and determines a change in the emotion level of the user by comparing the first set of voice features to the second set of voice features. The module normalizes the change in the emotion level of the user using emotion influence factors, and generates a service score.
    Type: Application
    Filed: April 26, 2016
    Publication date: October 26, 2017
    Inventors: Jason Kao, Xinxin Sheng, Bahram Omidfar, Erkang Zheng
  • Publication number: 20170169230
    Abstract: A computer-implemented system is provided for visualizing and analyzing security threats in a suite of software applications. The system includes a visualization module for rendering, on a computer display, a map with components representative of the suite of software applications and relationships among the software applications. The components are displayed in a base layer of the map. The system also includes a threat modeling module configured to automatically identify one or more security threats in the suite of software applications. The threat modeling module is adapted to interact with the visualization module to graphically depict on the computer display the one or more security threats on the map in a threat modeling layer. The system further includes a security controls module configured to implement security controls for mitigating the one or more security threats identified by the threat modeling module.
    Type: Application
    Filed: December 14, 2016
    Publication date: June 15, 2017
    Inventors: Erkang Zheng, Jason Kao