Patents by Inventor Qihong Shao

Qihong Shao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240135279
    Abstract: Methods are provided in which a computing device obtains user data and network data associated with one or more assets used in an enterprise network of a user. The computing device further determines an identity of the user based on the user data and the network data and generates a task recommendation based on the identity of the user. The task recommendation includes one or more tasks having a plurality of operations that are to be performed within a predetermined time interval. The computing device further provides the task recommendation for performing one or more actions associated with configuring the enterprise network.
    Type: Application
    Filed: October 24, 2022
    Publication date: April 25, 2024
    Inventors: Qixu Gong, Doosan Jung, Qihong Shao
  • Patent number: 11843515
    Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.
    Type: Grant
    Filed: December 16, 2022
    Date of Patent: December 12, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
  • Publication number: 20230118857
    Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.
    Type: Application
    Filed: December 16, 2022
    Publication date: April 20, 2023
    Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
  • Patent number: 11533241
    Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.
    Type: Grant
    Filed: March 25, 2022
    Date of Patent: December 20, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
  • Publication number: 20220400131
    Abstract: A method, computer system, and computer program product are provided for mitigating network risk. A plurality of risk reports corresponding to a plurality of network devices in a network are processed to determine a multidimensional risk score for the network. The plurality of risk reports are analyzed using a semantic analysis model to identify one or more factors that contribute to the multidimensional risk score. One or more actions are determined using a trained learning model to mitigate one or more dimensions of the multidimensional risk score. The outcomes of applying the one or more actions are presented to a user to indicate an effect of each of the one or more actions on the multidimensional risk score for the network.
    Type: Application
    Filed: June 11, 2021
    Publication date: December 15, 2022
    Inventors: Qihong Shao, Xinjun Zhang, Yue Liu, Kevin Broich, Kenneth Charles Croley, Gurvinder P. Singh
  • Publication number: 20220217056
    Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.
    Type: Application
    Filed: March 25, 2022
    Publication date: July 7, 2022
    Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
  • Publication number: 20220131761
    Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.
    Type: Application
    Filed: October 22, 2020
    Publication date: April 28, 2022
    Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
  • Patent number: 11316750
    Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.
    Type: Grant
    Filed: October 22, 2020
    Date of Patent: April 26, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
  • Publication number: 20220103586
    Abstract: A method, computer system, and computer program product are provided for network risk analysis. A plurality of risk reports relating to a network device in a network are obtained, wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the network device in the network. A count of the plurality of risk reports is determined for each dimension of the plurality of dimensions of risk. A regression model is applied to determine a risk value for the network device in the network based on the count of the plurality of risk reports for each dimension and based a role of the network device in the network.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Inventors: Qihong Shao, David John Zacks, Yue Liu, Xinjun Zhang
  • Patent number: 11011183
    Abstract: At a communication server, a first computer device and a second computer device are connected to a collaborative support session configured to support audio communications, screen sharing, and control of the first computer device by the second computer device. Screen sharing video image content is converted to a text sequence with timestamps. A text log with timestamps is generated from the text sequence. Using a command-based machine learning model, a sequence of commands and associated parameters, with timestamps, are determined from the text log. Audio is analyzed to produce speech-based information with timestamps. The command sequence is time-synchronized with the speech-based information based on the timestamps of the command sequence and the timestamps of the speech-based information. A knowledge report for the collaborative support session is generated.
    Type: Grant
    Filed: March 25, 2019
    Date of Patent: May 18, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Qihong Shao, Pranjal Daga, Dmitry Goloubew, Anastasia Feygina, Antonio Nucci, Carlos M. Pignataro, Gyana R. Dash
  • Publication number: 20200312348
    Abstract: At a communication server, a first computer device and a second computer device are connected to a collaborative support session configured to support audio communications, screen sharing, and control of the first computer device by the second computer device. Screen sharing video image content is converted to a text sequence with timestamps. A text log with timestamps is generated from the text sequence. Using a command-based machine learning model, a sequence of commands and associated parameters, with timestamps, are determined from the text log. Audio is analyzed to produce speech-based information with timestamps. The command sequence is time-synchronized with the speech-based information based on the timestamps of the command sequence and the timestamps of the speech-based information. A knowledge report for the collaborative support session is generated.
    Type: Application
    Filed: March 25, 2019
    Publication date: October 1, 2020
    Inventors: Qihong Shao, Pranjal Daga, Dmitry Goloubew, Anastasia Feygina, Antonio Nucci, Carlos M. Pignataro, Gyana R. Dash
  • Publication number: 20110078071
    Abstract: Data representative of a plurality of mortgage applications is obtained. The applications participate in a mortgage origination process, and each of the applications has associated therewith customer-specific attributes and product-specific attributes. The mortgage origination process has a plurality of statuses. Data representative of at least one environmental attribute is also obtained. Each given one of the mortgage applications in a given one of the plurality of statuses at a given time is ranked by likelihood of not closing, based at least on the customer-specific attributes, the product-specific attributes, and the at least one environmental attribute. Those of the mortgage applications likely not to close which are likely not to close due to non-exogenous attributes are identified.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 31, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chitra Dorai, Jane D. Hoffmann, Daniel N. Johnson, Milind R. Naphade, Qihong Shao, Anshul Sheopuri