Patents by Inventor Rupo ZHANG

Rupo ZHANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12132760
    Abstract: The technology described herein identifies and mitigates phishing attempts by analyzing user input received at the operating system level. Initially, a credential, such as a username or password, is registered with the threat detection system. The technology described herein intercepts user input at the operating system level, generates a hash of the input, and compares it with a hash of a credential being monitored. A credential entry is detected when a hash for the character string entered matches a hash for a credential being monitored. The technology described herein will perform a threat assessment when a secret entry is detected. The threat assessment may use the application context and the network context as inputs to the assessment. Various mitigation actions may be taken when a threat is detected.
    Type: Grant
    Filed: March 3, 2022
    Date of Patent: October 29, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Paresh Maisuria, Ali Alabbas, Abhishek Sagar, Mara Beth Fortini, Rupo Zhang, Christian Stockwell, Michael David McCormack, Jason Joseph Weber, Charles J. Strempler, Sinclaire R. Hamilton, Brian Keith Catlin, Richard Joseph Murillo, Robert G. Lefferts, Eric P. Douglas, Christian Seifert
  • Publication number: 20230283633
    Abstract: The technology described herein identifies and mitigates phishing attempts by analyzing user input received at the operating system level. Initially, a credential, such as a username or password, is registered with the threat detection system. The technology described herein intercepts user input at the operating system level, generates a hash of the input, and compares it with a hash of a credential being monitored. A credential entry is detected when a hash for the character string entered matches a hash for a credential being monitored. The technology described herein will perform a threat assessment when a secret entry is detected. The threat assessment may use the application context and the network context as inputs to the assessment. Various mitigation actions may be taken when a threat is detected.
    Type: Application
    Filed: March 3, 2022
    Publication date: September 7, 2023
    Inventors: Paresh MAISURIA, Ali ALABBAS, Abhishek SAGAR, Mara Beth FORTINI, Rupo ZHANG, Christian STOCKWELL, Michael David MCCORMACK, Jason Joseph WEBER, Charles J. STREMPLER, Sinclaire R. HAMILTON, Brian Keith CATLIN, Richard Joseph MURILLO, Robert G. LEFFERTS, Eric P. DOUGLAS, Christian SEIFERT