Patents by Inventor Shuo DENG

Shuo DENG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11972580
    Abstract: This application relates to the field of video processing, and discloses a video stitching method and apparatus, an electronic device, and a non-transitory computer-readable storage medium, where the video stitching method includes: detecting a similarity between a first image and a second image, the first image being an image frame of a first to-be-stitched video, and the second image being an image frame of a second to-be-stitched video; then determining a motion vector of the first image relative to the second image when the similarity meets a preset condition; and then determining at least one compensated frame between the first image and the second image according to the motion vector, and stitching the first image and the second image based on the at least one compensated frame to stitch the first to-be-stitched video and the second to-be-stitched video.
    Type: Grant
    Filed: February 24, 2021
    Date of Patent: April 30, 2024
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventor: Shuo Deng
  • Patent number: 11948597
    Abstract: The embodiments of this application disclose an audio processing method and apparatus, an electronic device, and a storage medium. In the embodiments of this application, a current playback environment of audio may be obtained; audio recognition may be performed on ambient sound of the current playback environment in a case that the current playback environment is in a foreground state; foreground sound in the ambient sound may be determined according to an audio recognition result; the foreground sound in the ambient sound may be classified to determine a type of the foreground sound; and audio mixing may be performed on the foreground sound and the audio to obtain mixed playback sound based on the type of the foreground sound.
    Type: Grant
    Filed: November 16, 2021
    Date of Patent: April 2, 2024
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: Shuo Deng
  • Patent number: 11949713
    Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: April 2, 2024
    Assignee: Abnormal Security Corporation
    Inventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Kishnamoorthi, Feng Shuo Deng
  • Patent number: 11943257
    Abstract: Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: March 26, 2024
    Assignee: Abnormal Security Corporation
    Inventors: Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
  • Patent number: 11790060
    Abstract: Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication. These models can be stored in profiles that are associated with the employees. At a high level, these profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Moreover, remediation may be performed if an account is determined to be compromised based on its recent activity.
    Type: Grant
    Filed: March 2, 2021
    Date of Patent: October 17, 2023
    Assignee: Abnormal Security Corporation
    Inventors: Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
  • Publication number: 20230208876
    Abstract: Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.
    Type: Application
    Filed: December 21, 2022
    Publication date: June 29, 2023
    Inventors: Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
  • Patent number: 11663303
    Abstract: Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed. These models can be stored in profiles that are associated with the employees. Such profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Remediation can be performed if an account is determined to be compromised based on its recent activity.
    Type: Grant
    Filed: July 9, 2022
    Date of Patent: May 30, 2023
    Assignee: Abnormal Security Corporation
    Inventors: Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
  • Publication number: 20220342966
    Abstract: Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed. These models can be stored in profiles that are associated with the employees. Such profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Remediation can be performed if an account is determined to be compromised based on its recent activity.
    Type: Application
    Filed: July 9, 2022
    Publication date: October 27, 2022
    Inventors: Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
  • Publication number: 20220255961
    Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.
    Type: Application
    Filed: December 14, 2021
    Publication date: August 11, 2022
    Inventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Kishnamoorthi, Feng Shuo Deng
  • Publication number: 20220076692
    Abstract: The embodiments of this application disclose an audio processing method and apparatus, an electronic device, and a storage medium. In the embodiments of this application, a current playback environment of audio may be obtained; audio recognition may be performed on ambient sound of the current playback environment in a case that the current playback environment is in a foreground state; foreground sound in the ambient sound may be determined according to an audio recognition result; the foreground sound in the ambient sound may be classified to determine a type of the foreground sound; and audio mixing may be performed on the foreground sound and the audio to obtain mixed playback sound based on the type of the foreground sound.
    Type: Application
    Filed: November 16, 2021
    Publication date: March 10, 2022
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventor: Shuo DENG
  • Patent number: 11252189
    Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.
    Type: Grant
    Filed: January 22, 2021
    Date of Patent: February 15, 2022
    Assignee: Abnormal Security Corporation
    Inventors: Evan James Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Krishnamoorthi, Fang Shuo Deng
  • Publication number: 20210271741
    Abstract: Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication. These models can be stored in profiles that are associated with the employees. At a high level, these profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Moreover, remediation may be performed if an account is determined to be compromised based on its recent activity.
    Type: Application
    Filed: March 2, 2021
    Publication date: September 2, 2021
    Inventors: Rami Faris HABAL, Abhijit BAGRI, Yea So JUNG, Fang Shuo DENG, Jeremy KAO, Jeshua Alexis BRATMAN, Umut GULTEPE, Hariank Sagar Muthakana
  • Publication number: 20210273976
    Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.
    Type: Application
    Filed: January 22, 2021
    Publication date: September 2, 2021
    Inventors: Evan James Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Krishnamoorthi, Fang Shuo Deng
  • Publication number: 20210183013
    Abstract: This application relates to the field of video processing, and discloses a video stitching method and apparatus, an electronic device, and a non-transitory computer-readable storage medium, where the video stitching method includes: detecting a similarity between a first image and a second image, the first image being an image frame of a first to-be-stitched video, and the second image being an image frame of a second to-be-stitched video; then determining a motion vector of the first image relative to the second image when the similarity meets a preset condition; and then determining at least one compensated frame between the first image and the second image according to the motion vector, and stitching the first image and the second image based on the at least one compensated frame to stitch the first to-be-stitched video and the second to-be-stitched video.
    Type: Application
    Filed: February 24, 2021
    Publication date: June 17, 2021
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventor: Shuo DENG
  • Publication number: 20180270454
    Abstract: A video monitoring method and device are described. The method includes obtaining a video image data and a group to which a member belongs; screening the obtained video image data according to a permission mapping table and the obtained group; and displaying the screened video image data. With embodiments of the method and device, by reconstructing video monitoring contents and generating the video data required by a user according to the customization of different types of member groups, on the one hand, the purpose of the personalized browsing and privacy protection of the customized content is achieved to better ensure the security of video monitoring, thereby protecting the privacy of the video monitoring contents; on the other hand, actual workload of monitoring personnel is greatly reduced without reducing user perception, the transmission bandwidth is saved.
    Type: Application
    Filed: April 10, 2015
    Publication date: September 20, 2018
    Applicant: ZTE CORPORATION
    Inventor: Shuo DENG
  • Patent number: 9973517
    Abstract: Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware.
    Type: Grant
    Filed: January 7, 2014
    Date of Patent: May 15, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Hsu-Chun Hsiao, Shuo Deng, Babak Salamat, Rajarshi Gupta, Saumitra Mohan Das
  • Patent number: 9832211
    Abstract: Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware.
    Type: Grant
    Filed: March 19, 2012
    Date of Patent: November 28, 2017
    Assignee: QUALCOMM, Incorporated
    Inventors: Hsu-Chun Hsiao, Shuo Deng, Babak Salamat, Rajarshi Gupta, Saumitra Mohan Das
  • Publication number: 20160135755
    Abstract: A remote home health care system is described.
    Type: Application
    Filed: August 19, 2013
    Publication date: May 19, 2016
    Inventors: Ping Lu, Shuo Deng, Mengqian Lou, Yi Xie, Zhixin Sun
  • Publication number: 20150331558
    Abstract: A method for switching pictures of picture galleries and a browser are described. After receiving a picture switching instruction, judging whether an original picture gallery corresponding to an original picture displayed on a picture gallery interface and a target picture gallery corresponding to a target picture are a same gallery. If the original picture gallery and the target picture gallery are different, generating a picture gallery-picture gradual change switch mode. According to the picture gallery-picture gradual change switch mode, switching the original picture displayed on the picture gallery interface to the target picture.
    Type: Application
    Filed: November 21, 2013
    Publication date: November 19, 2015
    Inventors: Shuo DENG, Chuanchuan BO, Chundong HU, Liang ZENG, Tianyang LIU
  • Publication number: 20150327008
    Abstract: A method and server updates service information. A service information update request may be received from a mobile terminal device. The service information update request may include a user Identity (ID) of a user. Characteristic information of the user may be determined according to the user ID. Service information may be determined according to the characteristic information of the user and information relating to an area, at which the mobile terminal device may be located. The service information may be sent to the mobile terminal device.
    Type: Application
    Filed: June 15, 2015
    Publication date: November 12, 2015
    Inventors: Shuo DENG, Jiangquan HUANG, Chuanchuan BO, Jie HOU, Liang ZENG, Chundong HU, Tianyang LIU, Ming HE, Lei CHEN, Fang FANG