Patents by Inventor Jianpeng Mo
Jianpeng Mo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11165811Abstract: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.Type: GrantFiled: February 3, 2020Date of Patent: November 2, 2021Assignee: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Ali Rezafard, David Matthew Patt
-
Publication number: 20200177620Abstract: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.Type: ApplicationFiled: February 3, 2020Publication date: June 4, 2020Applicant: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Ali Rezafard, David Matthew Patt
-
Patent number: 10621345Abstract: A method for securely validating the file format type including receiving a file having a file format type, a header and a content block. The header has a header block with a description representing attributes of the actual content in the file. The content block has leading bytes representing attributes of the actual content, and actual content. Data is parsed from the description of the header block, the leading bytes and the actual content. Data from the description is compared to the data from the leading bytes, data from the leading bytes is compared to the data from the actual content, and data from the description is compared to the data from the actual content. The file format type is validated and trustable when the data from the description, the data from the leading bytes and the data from the actual content are consistent with one another.Type: GrantFiled: February 14, 2019Date of Patent: April 14, 2020Assignee: OPSWAT, Inc.Inventors: Benjamin Czarny, Yiyi Miao, Jianpeng Mo
-
Publication number: 20200104494Abstract: A method for securely validating the file format type including receiving a file having a file format type, a header and a content block. The header has a header block with a description representing attributes of the actual content in the file. The content block has leading bytes representing attributes of the actual content, and actual content. Data is parsed from the description of the header block, the leading bytes and the actual content. Data from the description is compared to the data from the leading bytes, data from the leading bytes is compared to the data from the actual content, and data from the description is compared to the data from the actual content. The file format type is validated and trustable when the data from the description, the data from the leading bytes and the data from the actual content are consistent with one another.Type: ApplicationFiled: February 14, 2019Publication date: April 2, 2020Applicant: OPSWAT, Inc.Inventors: Benjamin Czarny, Yiyi Miao, Jianpeng Mo
-
Patent number: 10554681Abstract: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.Type: GrantFiled: October 29, 2018Date of Patent: February 4, 2020Assignee: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Ali Rezafard, David Matthew Patt
-
Patent number: 10242189Abstract: A method for securely validating the file format type including receiving a file having a file format type, a header and a content block. The header has a header block with a description representing attributes of the actual content in the file. The content block has leading bytes representing attributes of the actual content, and actual content. Data is parsed from the description of the header block, the leading bytes and the actual content. Data from the description is compared to the data from the leading bytes, data from the leading bytes is compared to the data from the actual content, and data from the description is compared to the data from the actual content. The file format type is validated and trustable when the data from the description, the data from the leading bytes and the data from the actual content are consistent with one another.Type: GrantFiled: October 1, 2018Date of Patent: March 26, 2019Assignee: OPSWAT, Inc.Inventors: Benjamin Czarny, Yiyi Miao, Jianpeng Mo
-
Patent number: 10229069Abstract: A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.Type: GrantFiled: June 15, 2018Date of Patent: March 12, 2019Assignee: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Boris Dynin
-
Publication number: 20190075129Abstract: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.Type: ApplicationFiled: October 29, 2018Publication date: March 7, 2019Applicant: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Ali Rezafard, David Matthew Patt
-
Publication number: 20180352003Abstract: Embodiments of the present invention include methods involving an authentication application, a client application, or a combination of a network access control server with the authentication application and the client application. The client application collects compliance data regarding the user device and communicates the compliance data to the network access control server. The network access control server generates a compliance check result based on whether the compliance data indicates that the user device is compliant with a security policy for the software-as-a-service server. The authentication application grants access by the user device when the compliance check result is positive; and the authentication application denies access by the user device when the compliance check result is negative. In some embodiments, the compliance check result or a user device identifier is stored in a web browser cookie or a client certificate on the user device.Type: ApplicationFiled: August 9, 2018Publication date: December 6, 2018Applicant: OPSWAT, Inc.Inventors: Adam Gregory Winn, Benjamin Czarny, Jianpeng Mo, Yiyi Miao
-
Patent number: 10116683Abstract: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.Type: GrantFiled: July 31, 2017Date of Patent: October 30, 2018Assignee: OPSWAT, INC.Inventors: Benjamin Czarny, Jianpeng Mo, Ali Rezafard, David Matthew Patt
-
Publication number: 20180293180Abstract: A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.Type: ApplicationFiled: June 15, 2018Publication date: October 11, 2018Applicant: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Boris Dynin
-
Patent number: 10063594Abstract: Embodiments of the present invention include methods involving an authentication application, a client application, or a combination of a network access control server with the authentication application and the client application. The client application collects compliance data regarding the user device and communicates the compliance data to the network access control server. The network access control server generates a compliance check result based on whether the compliance data indicates that the user device is compliant with a security policy for the software-as-a-service server. The authentication application grants access by the user device when the compliance check result is positive; and the authentication application denies access by the user device when the compliance check result is negative. In some embodiments, the compliance check result or a user device identifier is stored in a web browser cookie or a client certificate on the user device.Type: GrantFiled: March 14, 2016Date of Patent: August 28, 2018Assignee: OPSWAT, INC.Inventors: Adam Gregory Winn, Benjamin Czarny, Jianpeng Mo, Yiyi Miao
-
Patent number: 10002083Abstract: A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.Type: GrantFiled: June 28, 2017Date of Patent: June 19, 2018Assignee: OPSWAT, INC.Inventors: Benjamin Czarny, Jianpeng Mo, Boris Dynin
-
Publication number: 20180091543Abstract: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.Type: ApplicationFiled: July 31, 2017Publication date: March 29, 2018Applicant: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Ali Rezafard, David Matthew Patt
-
Publication number: 20170300429Abstract: A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.Type: ApplicationFiled: June 28, 2017Publication date: October 19, 2017Applicant: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Boris Dynin
-
Patent number: 9749349Abstract: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.Type: GrantFiled: September 23, 2016Date of Patent: August 29, 2017Assignee: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Ali Rezafard, David Matthew Patt
-
Patent number: 9697367Abstract: A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.Type: GrantFiled: October 17, 2016Date of Patent: July 4, 2017Assignee: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Boris Dynin
-
Publication number: 20170032133Abstract: A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.Type: ApplicationFiled: October 17, 2016Publication date: February 2, 2017Applicant: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Boris Dynin
-
Patent number: 9471794Abstract: A method, program and/or system reads a file through a first path from a data storage to obtain a first data. The file is read through a second path from the data storage to obtain a second data. The first data is compared to the second data. When the first data matches the second data, the file is determined not to be encrypted in the data storage. When the first data does not match the second data, the file is determined to be encrypted in the data storage.Type: GrantFiled: February 3, 2016Date of Patent: October 18, 2016Assignee: OPSWAT, Inc.Inventors: Benjamin Czarny, Jianpeng Mo, Boris Dynin
-
Publication number: 20160197962Abstract: Embodiments of the present invention include methods involving an authentication application, a client application, or a combination of a network access control server with the authentication application and the client application. The client application collects compliance data regarding the user device and communicates the compliance data to the network access control server. The network access control server generates a compliance check result based on whether the compliance data indicates that the user device is compliant with a security policy for the software-as-a-service server. The authentication application grants access by the user device when the compliance check result is positive; and the authentication application denies access by the user device when the compliance check result is negative. In some embodiments, the compliance check result or a user device identifier is stored in a web browser cookie or a client certificate on the user device.Type: ApplicationFiled: March 14, 2016Publication date: July 7, 2016Inventors: Adam Gregory Winn, Benjamin Czarny, Jianpeng Mo, Yiyi Miao