Patents by Inventor Guo Peng
Guo Peng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240106171Abstract: An electrical connector assembly includes: a male connector, provided with a conductive shell; a first substrate, accommodated in the conductive shell and used to transmit receiving signals; a second substrate, accommodated in the conductive shell and used to transmit sending signals; a shielding sheet, located between the first substrate and the second substrate; a female connector, provided with a first conductive body and a second conductive body; a plurality of first signal terminals, accommodated in the first conductive body and used to transmit receiving signals; and a plurality of second signal terminals, accommodated in the second conductive body and used to transmit sending signals. The first signal terminals and the first substrate are electrically contacted to each other. The second signal terminals and the second substrate are electrically contacted to each other. The first conductive body and/or the second conductive body are used to lap joint with the shielding sheet.Type: ApplicationFiled: September 13, 2023Publication date: March 28, 2024Inventors: Po Jui Chou, Zhi Guo Peng, Chien Chih Ho, Hui Yi
-
Patent number: 11349713Abstract: A computer-implemented method receives a program code and a signature associated with the program code from a database persistency associated with an enterprise threat detection (ETD) system. The received program code is associated with a configuration check, and the configuration check is developed at a development computing system and can collect information associated with a computing system. The received program code and the signature associated with the program code is distributed to a plurality of computing systems that are monitored by the ETD system. At least one configuration check result is received, and the configuration check result is generated by executing the program code on the computing system. The at least one configuration check result then transmitted to the database persistence, and the at least one result is displayed on a database graphical user interface (GUI) associated with the database persistency.Type: GrantFiled: October 8, 2020Date of Patent: May 31, 2022Assignee: SAP SEInventors: Eugen Pritzkau, Hartwig Seifert, Kevin Schwab, Omar-Alexander Al-Hujaj, Volker Guzman, Wei-Guo Peng, Lin Luo, Harish Mehta
-
Patent number: 11128651Abstract: Search results are received from an initiated free text search of log data from one or more logs, where the free text is performed using search terms entered into a free text search graphical user interface. A set of at least one search result is selected from the search results containing an event desired to be identified in a completed enterprise threat detection (ETD) pattern. A forensic lab application is rendered to complete an ETD pattern. An event filter is added for an event type based on normalized log data to a path. A relative ETD pattern time range is set and an ETD pattern is completed based on the added event filter.Type: GrantFiled: January 6, 2020Date of Patent: September 21, 2021Assignee: SAP SEInventors: Eugen Pritzkau, Joscha Philipp Bohn, Daniel Kartmann, Wei-Guo Peng, Hristina Dinkova, Lin Luo, Thomas Kunz, Marco Rodeck, Hartwig Seifert, Harish Mehta, Nan Zhang, Rita Merkel, Florian Chrosziel
-
Patent number: 11012465Abstract: A computer-implemented method generates a trigger registration for a selected triggering type. The generated trigger registration is stored in a triggering persistency. A received event from an event persistency is analyzed and data associated with the analyzed event is compared with the triggering persistency. Based on the comparison and using a pattern execution framework, an enterprise threat detection (ETD) pattern is processed to perform actions responsive to the received event.Type: GrantFiled: January 13, 2020Date of Patent: May 18, 2021Assignee: SAP SEInventors: Eugen Pritzkau, Kathrin Nos, Marco Rodeck, Florian Chrosziel, Jona Hassforther, Rita Merkel, Thorsten Menke, Thomas Kunz, Hartwig Seifert, Harish Mehta, Wei-Guo Peng, Lin Luo, Nan Zhang, Hristina Dinkova
-
Patent number: 10986111Abstract: One or more entities are selected for which logged Events are to be displayed in an Event Series Chart. One or more filters and a timeframe are selected. Events are fetched from one or more selected log files based on the one or more selected filters and the timeframe. The fetched Events are displayed in an Event Series Chart according to an associated timestamp and identification Event property value associated with each fetched Event.Type: GrantFiled: December 19, 2017Date of Patent: April 20, 2021Assignee: SAP SEInventors: Wei-Guo Peng, Lin Luo, Hartwig Seifert, Nan Zhang, Harish Mehta, Florian Chrosziel, Rita Merkel, Eugen Pritzkau, Jona Hassforther, Thorsten Menke, Thomas Kunz, Kathrin Nos, Marco Rodeck
-
Patent number: 10919009Abstract: An automatic stirring cup, comprising a cup body, a stirring ball arranged at the bottom of a cavity of the cup body and a power base for supplying power to the stirring ball; a first electrode for electrically connecting the stirring ball and the power base is arranged at the bottom of the cup body; a first magnet is arranged in the stirring ball, and a second magnet matched with the first magnet is arranged at the bottom of the cup body, and the stirring ball and the cup body are magnetically connected; a third magnet matched with the second magnet is arranged at the power base, and the cup body and the power base are magnetically connected. The automatic stirring cup could avoid the water leakage problem during the use of the automatic stirring cup in the prior art.Type: GrantFiled: November 2, 2018Date of Patent: February 16, 2021Assignee: Shenzhen ToolFeel Plastic & Hardware Co., Ltd.Inventor: Guo Peng
-
Publication number: 20210028986Abstract: A computer-implemented method receives a program code and a signature associated with the program code from a database persistency associated with an enterprise threat detection (ETD) system. The received program code is associated with a configuration check, and the configuration check is developed at a development computing system and can collect information associated with a computing system. The received program code and the signature associated with the program code is distributed to a plurality of computing systems that are monitored by the ETD system. At least one configuration check result is received, and the configuration check result is generated by executing the program code on the computing system. The at least one configuration check result then transmitted to the database persistence, and the at least one result is displayed on a database graphical user interface (GUI) associated with the database persistency.Type: ApplicationFiled: October 8, 2020Publication date: January 28, 2021Inventors: Eugen Pritzkau, Hartwig Seifert, Kevin Schwab, Omar-Alexander Al-Hujaj, Volker Guzman, Wei-Guo Peng, Lin Luo, Harish Mehta
-
Patent number: 10841161Abstract: A computer-implemented method receives a program code and a signature associated with the program code from a database persistency associated with an enterprise threat detection (ETD) system. The received program code is associated with a configuration check, and the configuration check is developed at a development computing system and can collect information associated with a computing system. The received program code and the signature associated with the program code is distributed to a plurality of computing systems that are monitored by the ETD system. At least one configuration check result is received, and the configuration check result is generated by executing the program code on the computing system. The at least one configuration check result then transmitted to the database persistence, and the at least one result is displayed on a database graphical user interface (GUI) associated with the database persistency.Type: GrantFiled: August 2, 2018Date of Patent: November 17, 2020Assignee: SAP SEInventors: Eugen Pritzkau, Hartwig Seifert, Kevin Schwab, Omar-Alexander Al-Hujaj, Volker Guzman, Wei-Guo Peng, Lin Luo, Harish Mehta
-
Patent number: 10826926Abstract: A first Event is identified from a normalized log persistency layer, where the first Event is associated with an attack on a computing system. A plurality of Events are fetched from the normalized log persistency layer, where each fetched Event correlates with its neighboring fetched Event by at least one correlation attribute, and each of the fetched Event and the first Event are presented on a graphical user interface as a chain of events. A workspace is generated, where the workspace comprises a series of attack paths, where each attack path corresponds to one Event in the chain of events. An ETD pattern is created based on the attack paths in the workspace.Type: GrantFiled: July 17, 2018Date of Patent: November 3, 2020Assignee: SAP SEInventors: Eugen Pritzkau, Wei-Guo Peng, Omar-Alexander Al-Hujaj, Lin Luo, Volker Guzman, Kevin Schwab
-
Publication number: 20200195680Abstract: A computer-implemented method generates a trigger registration for a selected triggering type. The generated trigger registration is stored in a triggering persistency. A received event from an event persistency is analyzed and data associated with the analyzed event is compared with the triggering persistency. Based on the comparison and using a pattern execution framework, an enterprise threat detection (ETD) pattern is processed to perform actions responsive to the received event.Type: ApplicationFiled: January 13, 2020Publication date: June 18, 2020Inventors: Eugen Pritzkau, Kathrin Nos, Marco Rodeck, Florian Chrosziel, Jona Hassforther, Rita Merkel, Thorsten Menke, Thomas Kunz, Hartwig Seifert, Harish Mehta, Wei-Guo Peng, Lin Luo, Nan Zhang, Hristina Dinkova
-
Patent number: 10681064Abstract: A filter is selected from one or more filters defined for an ETD Network Graph. Events are fetched from the selected log files based on the selected filter and entities identified based on the fetched Events. Relationships are determined between the identified entities, and the determined relationships and identified entities are displayed in the ETD Network Graph. An identified entity is selected to filter data in an ETD Event Series Chart. An Event is selected in the ETD Event Series Chart to display Event Attributes in an Event Attribute Dialog. An Event Attribute is selected in the Event Attribute Dialog to filter Events in the ETD Event Series Chart.Type: GrantFiled: December 19, 2017Date of Patent: June 9, 2020Assignee: SAP SEInventors: Wei-Guo Peng, Lin Luo, Eugen Pritzkau, Hartwig Seifert, Harish Mehta, Nan Zhang, Thorsten Menke, Jona Hassforther, Rita Merkel, Florian Chrosziel, Kathrin Nos, Marco Rodeck, Thomas Kunz
-
Patent number: 10673879Abstract: An enterprise threat detection (ETD) forensic workspace is established according to a particular timeframe and permitting defining a selection of data types from available log data for an evaluation of events associated with one or more entities. A chart is defined illustrating a graphical distribution of a particular data type in the forensic workspace. A snapshot associated with the chart is generated, the snapshot saving a copy of all data necessary to re-create the chart into an associated snapshot object. The snapshot is associated with a snapshot page for containing the snapshot and the snapshot page is saved within the ETD forensic workspace.Type: GrantFiled: September 23, 2016Date of Patent: June 2, 2020Assignee: SAP SEInventors: Florian Chrosziel, Jona Hassforther, Thomas Kunz, Harish Mehta, Rita Merkel, Kathrin Nos, Wei-Guo Peng, Eugen Pritzkau, Marco Rodeck, Hartwig Seifert, Nan Zhang, Thorsten Menke, Hristina Dinkova, Lin Luo
-
Publication number: 20200145444Abstract: Search results are received from an initiated free text search of log data from one or more logs, where the free text is performed using search terms entered into a free text search graphical user interface. A set of at least one search result is selected from the search results containing an event desired to be identified in a completed enterprise threat detection (ETD) pattern. A forensic lab application is rendered to complete an ETD pattern. An event filter is added for an event type based on normalized log data to a path. A relative ETD pattern time range is set and an ETD pattern is completed based on the added event filter.Type: ApplicationFiled: January 6, 2020Publication date: May 7, 2020Inventors: Eugen Pritzkau, Joscha Philipp Bohn, Daniel Kartmann, Wei-Guo Peng, Hristina Dinkova, Lin Luo, Thomas Kunz, Marco Rodeck, Hartwig Seifert, Harish Mehta, Nan Zhang, Rita Merkel, Florian Chrosziel
-
Patent number: D912518Type: GrantFiled: August 1, 2019Date of Patent: March 9, 2021Assignee: Shenzhen ToolFeel Plastic & Hardware Co., Ltd.Inventor: Guo Peng
-
Patent number: D950306Type: GrantFiled: September 21, 2020Date of Patent: May 3, 2022Assignee: Shenzhen Too Feel Plastic & Hardware Co., LtdInventor: Guo Peng
-
Patent number: D950307Type: GrantFiled: December 2, 2020Date of Patent: May 3, 2022Assignee: Shenzhen Too Feel Plastic & Hardware Co., LtdInventor: Guo Peng
-
Patent number: D950315Type: GrantFiled: June 15, 2020Date of Patent: May 3, 2022Assignee: Shenzhen ToolFeel Plastic & Hardware Co., Ltd.Inventor: Guo Peng
-
Patent number: D952405Type: GrantFiled: September 21, 2020Date of Patent: May 24, 2022Assignee: Shenzhen Too Feel Plastic & Hardware Co., LtdInventor: Guo Peng
-
Patent number: D974829Type: GrantFiled: December 1, 2020Date of Patent: January 10, 2023Assignee: Shenzhen Too Feel Plastic & Hardware Co., LtdInventor: Guo Peng
-
Patent number: D974830Type: GrantFiled: December 1, 2020Date of Patent: January 10, 2023Assignee: Shenzhen Too Feel Plastic & Hardware Co., LtdInventor: Guo Peng