Patents by Inventor Kai Jing
Kai Jing has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240187450Abstract: It is determined that a first email is present in a mailbox where emails deemed suspicious are placed for analysis. In response to determining that the first email is present in the mailbox, it is determined whether the first email is representative of a threat to an enterprise based at least in part by applying a trained model to the first email. In response to determining that the first email represents a threat to the enterprise, a record of the threat is generated by populating a data structure with information related to the first email. The data structure is applied to inboxes of a plurality of the employees to determine whether the first email is part of a campaign. In response to determining that the first email is part of a campaign, a filter associated with the data structure is applied to inbound emails addressed to employees of the enterprise.Type: ApplicationFiled: February 15, 2024Publication date: June 6, 2024Inventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkat Krishnamoorthi, Fang Shuo Deng
-
Publication number: 20240171596Abstract: A message addressed to a user is received. A first model is applied to the message to produce a first output indicative of whether the message is representative of a non-malicious message. The first model is trained using past messages that have been verified as non-malicious messages. It is determined, based on the first output, that the message is potentially a malicious message. Responsive to determining that the message is potentially a malicious email based on the first output, apply a second model to the message to produce a second output indicative of whether the message is representative of a given type of attack. The second model is one of a plurality of models. At least one model included in the plurality of models is associated with characterizing a goal of the malicious message. An action is performed with respect to the message based on the second output.Type: ApplicationFiled: September 26, 2023Publication date: May 23, 2024Inventors: Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan Reiser, Sanny Xiao Lang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
-
Publication number: 20240147551Abstract: A first device performs periodic scanning alternately, where a first scanning periodicity is used for a first-type Bluetooth connection, and a second scanning periodicity is used for a second-type Bluetooth connection; the first device receives a first-type data packet from a second device in a first scan window of any first scanning periodicity, where the first-type data packet is used to establish the first-type Bluetooth connection; the first device obtains, based on the first-type data packet, a second connection parameter for establishing the second-type Bluetooth connection to the second device; and the first device establishes the second-type Bluetooth connection to the second device based on the second connection parameter.Type: ApplicationFiled: January 11, 2024Publication date: May 2, 2024Inventors: Zehong Zhang, Cong Cao, Tong Chen, Han Lu, Yufei Yang, Dishan Jing, Kai Xue
-
Patent number: 11946213Abstract: A high-speed train derailment arresting system is provided, which includes multiple passive protection arresting devices arranged on both sides of a high-speed railway line. The passive protection arresting device includes a rigid support assembly fixed on a respective side of the high-speed railway line and a rotating protective barrel arranged on the support assembly. A structural design method for the high-speed train derailment arresting system is further provided.Type: GrantFiled: October 19, 2023Date of Patent: April 2, 2024Assignee: Southwest Jiaotong UniversityInventors: Lin Jing, Shaoxuan Zhang, Kai Liu, Kaiyun Wang
-
Patent number: 11949713Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.Type: GrantFiled: December 14, 2021Date of Patent: April 2, 2024Assignee: Abnormal Security CorporationInventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Kishnamoorthi, Feng Shuo Deng
-
Patent number: 11943257Abstract: Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.Type: GrantFiled: December 21, 2022Date of Patent: March 26, 2024Assignee: Abnormal Security CorporationInventors: Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
-
Patent number: 11824870Abstract: Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.Type: GrantFiled: November 4, 2019Date of Patent: November 21, 2023Assignee: Abnormal Security CorporationInventors: Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
-
Patent number: 11743294Abstract: Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.Type: GrantFiled: June 28, 2021Date of Patent: August 29, 2023Assignee: Abnormal Security CorporationInventors: Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
-
Publication number: 20230208876Abstract: Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.Type: ApplicationFiled: December 21, 2022Publication date: June 29, 2023Inventors: Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
-
Patent number: 11686919Abstract: A driving mechanism is provided, including a fixed part, a movable part for holding an optical element, a driving assembly, and a positioning structure. The movable part is connected to the fixed part. The driving assembly is configured to drive the movable part to move relative to the fixed part. The positioning structure is formed on the movable part or the fixed part for positioning the optical element or at least one part of the driving assembly.Type: GrantFiled: December 27, 2019Date of Patent: June 27, 2023Assignee: TDK TAIWAN CORP.Inventors: Kai-Jing Fu, Chao-Chang Hu, Min-Hsiu Tsai, Mao-Kuo Hsu, Juei-Hung Tsai
-
Patent number: 11552969Abstract: Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.Type: GrantFiled: October 11, 2021Date of Patent: January 10, 2023Assignee: Abnormal Security CorporationInventors: Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan Reiser, Sanny Xiao Lang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
-
Publication number: 20220394057Abstract: Techniques for producing records of digital activities that are performed with accounts associated with employees of enterprises are disclosed. Such techniques can be used to ensure that records are created for digital activities that are deemed unsafe and for digital activities that are deemed safe by a threat detection platform. At a high level, more comprehensively recording digital activities not only provides insight into the behavior of individual accounts, but also provides insight into the holistic behavior of employees across multiple accounts. These records may be stored in a searchable datastore to enable expedient and efficient review.Type: ApplicationFiled: August 16, 2022Publication date: December 8, 2022Inventors: Jeremy Kao, Kai Jing Jiang, Sanjay Jeyakumar, Yea So Jung, Carlos Daniel Gasperi, Justin Anthony Young
-
Patent number: 11451576Abstract: Introduced here are computer programs and computer-implemented techniques for producing records of digital activities that are performed with accounts associated with employees of enterprises. Such an approach ensures that records are created for digital activities that are deemed unsafe and for digital activities that are deemed safe by a threat detection platform. At a high level, more comprehensively recording digital activities not only provides insight into the behavior of individual accounts, but also provides insight into the holistic behavior of employees across multiple accounts. These records may be stored in a searchable datastore to enable expedient and efficient review.Type: GrantFiled: March 12, 2021Date of Patent: September 20, 2022Assignee: Abnormal Security CorporationInventors: Jeremy Kao, Kai Jing Jiang, Sanjay Jeyakumar, Yea So Jung, Carlos Daniel Gasperi, Justin Anthony Young
-
Patent number: 11431738Abstract: Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.Type: GrantFiled: July 13, 2020Date of Patent: August 30, 2022Assignee: Abnormal Security CorporationInventors: Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
-
Patent number: 11422334Abstract: A driving mechanism is provided, including a fixed part, a movable part for holding an optical element, and a driving assembly. The movable part is movable relative to the fixed part and has a first resonance frequency with respect to the fixed part. The driving assembly is configured to drive the movable part to rotate back and forth within a range relative to the fixed part.Type: GrantFiled: January 9, 2020Date of Patent: August 23, 2022Assignee: TDK TAIWAN CORP.Inventors: Kai-Jing Fu, Chao-Chang Hu, Min-Hsiu Tsai, Mao-Kuo Hsu, Juei-Hung Tsai
-
Patent number: 11381581Abstract: Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.Type: GrantFiled: July 13, 2020Date of Patent: July 5, 2022Assignee: Abnormal Security CorporationInventors: Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
-
Patent number: 11366278Abstract: An optical member driving mechanism is provided, including a movable portion, a fixed portion, a driving assembly, a light emitter, and a light receiver. The driving assembly is configured to drive the movable portion to move relative to the fixed portion. The light emitter emits light toward an object, and the light receiver receives the light reflected by the object.Type: GrantFiled: December 27, 2019Date of Patent: June 21, 2022Assignee: TDK TAIWAN CORP.Inventors: Chao-Chang Hu, Mao-Kuo Hsu, Kai-Jing Fu
-
Patent number: 11336666Abstract: Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.Type: GrantFiled: July 13, 2020Date of Patent: May 17, 2022Assignee: Abnormal Security CorporationInventors: Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
-
Patent number: 11300761Abstract: A driving mechanism is provided, including a fixed part, a movable part for holding an optical element, and a driving assembly. The movable part is movable relative to the fixed part, and the driving assembly is configured to drive the movable part to move relative to the fixed part. Light reaches the optical element along an incident direction and leaves the optical element along an exit direction, wherein the exit direction is not parallel to the incident direction.Type: GrantFiled: January 9, 2020Date of Patent: April 12, 2022Assignee: TDK TAIWAN CORP.Inventors: Chao-Chang Hu, Mao-Kuo Hsu, Shu-Shan Chen, Kai-Jing Fu
-
Patent number: 11252189Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.Type: GrantFiled: January 22, 2021Date of Patent: February 15, 2022Assignee: Abnormal Security CorporationInventors: Evan James Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Krishnamoorthi, Fang Shuo Deng