Patents by Inventor Qihong Shao
Qihong Shao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240135279Abstract: Methods are provided in which a computing device obtains user data and network data associated with one or more assets used in an enterprise network of a user. The computing device further determines an identity of the user based on the user data and the network data and generates a task recommendation based on the identity of the user. The task recommendation includes one or more tasks having a plurality of operations that are to be performed within a predetermined time interval. The computing device further provides the task recommendation for performing one or more actions associated with configuring the enterprise network.Type: ApplicationFiled: October 24, 2022Publication date: April 25, 2024Inventors: Qixu Gong, Doosan Jung, Qihong Shao
-
Patent number: 11843515Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.Type: GrantFiled: December 16, 2022Date of Patent: December 12, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
-
Publication number: 20230118857Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.Type: ApplicationFiled: December 16, 2022Publication date: April 20, 2023Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
-
Patent number: 11533241Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.Type: GrantFiled: March 25, 2022Date of Patent: December 20, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
-
Publication number: 20220400131Abstract: A method, computer system, and computer program product are provided for mitigating network risk. A plurality of risk reports corresponding to a plurality of network devices in a network are processed to determine a multidimensional risk score for the network. The plurality of risk reports are analyzed using a semantic analysis model to identify one or more factors that contribute to the multidimensional risk score. One or more actions are determined using a trained learning model to mitigate one or more dimensions of the multidimensional risk score. The outcomes of applying the one or more actions are presented to a user to indicate an effect of each of the one or more actions on the multidimensional risk score for the network.Type: ApplicationFiled: June 11, 2021Publication date: December 15, 2022Inventors: Qihong Shao, Xinjun Zhang, Yue Liu, Kevin Broich, Kenneth Charles Croley, Gurvinder P. Singh
-
Publication number: 20220217056Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.Type: ApplicationFiled: March 25, 2022Publication date: July 7, 2022Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
-
Publication number: 20220131761Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.Type: ApplicationFiled: October 22, 2020Publication date: April 28, 2022Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
-
Patent number: 11316750Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.Type: GrantFiled: October 22, 2020Date of Patent: April 26, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
-
Publication number: 20220103586Abstract: A method, computer system, and computer program product are provided for network risk analysis. A plurality of risk reports relating to a network device in a network are obtained, wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the network device in the network. A count of the plurality of risk reports is determined for each dimension of the plurality of dimensions of risk. A regression model is applied to determine a risk value for the network device in the network based on the count of the plurality of risk reports for each dimension and based a role of the network device in the network.Type: ApplicationFiled: September 28, 2020Publication date: March 31, 2022Inventors: Qihong Shao, David John Zacks, Yue Liu, Xinjun Zhang
-
Patent number: 11011183Abstract: At a communication server, a first computer device and a second computer device are connected to a collaborative support session configured to support audio communications, screen sharing, and control of the first computer device by the second computer device. Screen sharing video image content is converted to a text sequence with timestamps. A text log with timestamps is generated from the text sequence. Using a command-based machine learning model, a sequence of commands and associated parameters, with timestamps, are determined from the text log. Audio is analyzed to produce speech-based information with timestamps. The command sequence is time-synchronized with the speech-based information based on the timestamps of the command sequence and the timestamps of the speech-based information. A knowledge report for the collaborative support session is generated.Type: GrantFiled: March 25, 2019Date of Patent: May 18, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Qihong Shao, Pranjal Daga, Dmitry Goloubew, Anastasia Feygina, Antonio Nucci, Carlos M. Pignataro, Gyana R. Dash
-
Publication number: 20200312348Abstract: At a communication server, a first computer device and a second computer device are connected to a collaborative support session configured to support audio communications, screen sharing, and control of the first computer device by the second computer device. Screen sharing video image content is converted to a text sequence with timestamps. A text log with timestamps is generated from the text sequence. Using a command-based machine learning model, a sequence of commands and associated parameters, with timestamps, are determined from the text log. Audio is analyzed to produce speech-based information with timestamps. The command sequence is time-synchronized with the speech-based information based on the timestamps of the command sequence and the timestamps of the speech-based information. A knowledge report for the collaborative support session is generated.Type: ApplicationFiled: March 25, 2019Publication date: October 1, 2020Inventors: Qihong Shao, Pranjal Daga, Dmitry Goloubew, Anastasia Feygina, Antonio Nucci, Carlos M. Pignataro, Gyana R. Dash
-
Publication number: 20110078071Abstract: Data representative of a plurality of mortgage applications is obtained. The applications participate in a mortgage origination process, and each of the applications has associated therewith customer-specific attributes and product-specific attributes. The mortgage origination process has a plurality of statuses. Data representative of at least one environmental attribute is also obtained. Each given one of the mortgage applications in a given one of the plurality of statuses at a given time is ranked by likelihood of not closing, based at least on the customer-specific attributes, the product-specific attributes, and the at least one environmental attribute. Those of the mortgage applications likely not to close which are likely not to close due to non-exogenous attributes are identified.Type: ApplicationFiled: September 25, 2009Publication date: March 31, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chitra Dorai, Jane D. Hoffmann, Daniel N. Johnson, Milind R. Naphade, Qihong Shao, Anshul Sheopuri