Patents by Inventor Shuo DENG
Shuo DENG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11972580Abstract: This application relates to the field of video processing, and discloses a video stitching method and apparatus, an electronic device, and a non-transitory computer-readable storage medium, where the video stitching method includes: detecting a similarity between a first image and a second image, the first image being an image frame of a first to-be-stitched video, and the second image being an image frame of a second to-be-stitched video; then determining a motion vector of the first image relative to the second image when the similarity meets a preset condition; and then determining at least one compensated frame between the first image and the second image according to the motion vector, and stitching the first image and the second image based on the at least one compensated frame to stitch the first to-be-stitched video and the second to-be-stitched video.Type: GrantFiled: February 24, 2021Date of Patent: April 30, 2024Assignee: Tencent Technology (Shenzhen) Company LimitedInventor: Shuo Deng
-
Patent number: 11948597Abstract: The embodiments of this application disclose an audio processing method and apparatus, an electronic device, and a storage medium. In the embodiments of this application, a current playback environment of audio may be obtained; audio recognition may be performed on ambient sound of the current playback environment in a case that the current playback environment is in a foreground state; foreground sound in the ambient sound may be determined according to an audio recognition result; the foreground sound in the ambient sound may be classified to determine a type of the foreground sound; and audio mixing may be performed on the foreground sound and the audio to obtain mixed playback sound based on the type of the foreground sound.Type: GrantFiled: November 16, 2021Date of Patent: April 2, 2024Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Shuo Deng
-
Patent number: 11949713Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.Type: GrantFiled: December 14, 2021Date of Patent: April 2, 2024Assignee: Abnormal Security CorporationInventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Kishnamoorthi, Feng Shuo Deng
-
Patent number: 11943257Abstract: Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.Type: GrantFiled: December 21, 2022Date of Patent: March 26, 2024Assignee: Abnormal Security CorporationInventors: Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
-
Patent number: 11790060Abstract: Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication. These models can be stored in profiles that are associated with the employees. At a high level, these profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Moreover, remediation may be performed if an account is determined to be compromised based on its recent activity.Type: GrantFiled: March 2, 2021Date of Patent: October 17, 2023Assignee: Abnormal Security CorporationInventors: Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
-
Publication number: 20230208876Abstract: Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.Type: ApplicationFiled: December 21, 2022Publication date: June 29, 2023Inventors: Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
-
Patent number: 11663303Abstract: Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed. These models can be stored in profiles that are associated with the employees. Such profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Remediation can be performed if an account is determined to be compromised based on its recent activity.Type: GrantFiled: July 9, 2022Date of Patent: May 30, 2023Assignee: Abnormal Security CorporationInventors: Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
-
Publication number: 20220342966Abstract: Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed. These models can be stored in profiles that are associated with the employees. Such profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Remediation can be performed if an account is determined to be compromised based on its recent activity.Type: ApplicationFiled: July 9, 2022Publication date: October 27, 2022Inventors: Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
-
Publication number: 20220255961Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.Type: ApplicationFiled: December 14, 2021Publication date: August 11, 2022Inventors: Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Kishnamoorthi, Feng Shuo Deng
-
Publication number: 20220076692Abstract: The embodiments of this application disclose an audio processing method and apparatus, an electronic device, and a storage medium. In the embodiments of this application, a current playback environment of audio may be obtained; audio recognition may be performed on ambient sound of the current playback environment in a case that the current playback environment is in a foreground state; foreground sound in the ambient sound may be determined according to an audio recognition result; the foreground sound in the ambient sound may be classified to determine a type of the foreground sound; and audio mixing may be performed on the foreground sound and the audio to obtain mixed playback sound based on the type of the foreground sound.Type: ApplicationFiled: November 16, 2021Publication date: March 10, 2022Applicant: Tencent Technology (Shenzhen) Company LimitedInventor: Shuo DENG
-
Patent number: 11252189Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.Type: GrantFiled: January 22, 2021Date of Patent: February 15, 2022Assignee: Abnormal Security CorporationInventors: Evan James Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Krishnamoorthi, Fang Shuo Deng
-
Publication number: 20210271741Abstract: Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication. These models can be stored in profiles that are associated with the employees. At a high level, these profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Moreover, remediation may be performed if an account is determined to be compromised based on its recent activity.Type: ApplicationFiled: March 2, 2021Publication date: September 2, 2021Inventors: Rami Faris HABAL, Abhijit BAGRI, Yea So JUNG, Fang Shuo DENG, Jeremy KAO, Jeshua Alexis BRATMAN, Umut GULTEPE, Hariank Sagar Muthakana
-
Publication number: 20210273976Abstract: Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.Type: ApplicationFiled: January 22, 2021Publication date: September 2, 2021Inventors: Evan James Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Krishnamoorthi, Fang Shuo Deng
-
Publication number: 20210183013Abstract: This application relates to the field of video processing, and discloses a video stitching method and apparatus, an electronic device, and a non-transitory computer-readable storage medium, where the video stitching method includes: detecting a similarity between a first image and a second image, the first image being an image frame of a first to-be-stitched video, and the second image being an image frame of a second to-be-stitched video; then determining a motion vector of the first image relative to the second image when the similarity meets a preset condition; and then determining at least one compensated frame between the first image and the second image according to the motion vector, and stitching the first image and the second image based on the at least one compensated frame to stitch the first to-be-stitched video and the second to-be-stitched video.Type: ApplicationFiled: February 24, 2021Publication date: June 17, 2021Applicant: Tencent Technology (Shenzhen) Company LimitedInventor: Shuo DENG
-
Publication number: 20180270454Abstract: A video monitoring method and device are described. The method includes obtaining a video image data and a group to which a member belongs; screening the obtained video image data according to a permission mapping table and the obtained group; and displaying the screened video image data. With embodiments of the method and device, by reconstructing video monitoring contents and generating the video data required by a user according to the customization of different types of member groups, on the one hand, the purpose of the personalized browsing and privacy protection of the customized content is achieved to better ensure the security of video monitoring, thereby protecting the privacy of the video monitoring contents; on the other hand, actual workload of monitoring personnel is greatly reduced without reducing user perception, the transmission bandwidth is saved.Type: ApplicationFiled: April 10, 2015Publication date: September 20, 2018Applicant: ZTE CORPORATIONInventor: Shuo DENG
-
Patent number: 9973517Abstract: Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware.Type: GrantFiled: January 7, 2014Date of Patent: May 15, 2018Assignee: QUALCOMM IncorporatedInventors: Hsu-Chun Hsiao, Shuo Deng, Babak Salamat, Rajarshi Gupta, Saumitra Mohan Das
-
Patent number: 9832211Abstract: Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware.Type: GrantFiled: March 19, 2012Date of Patent: November 28, 2017Assignee: QUALCOMM, IncorporatedInventors: Hsu-Chun Hsiao, Shuo Deng, Babak Salamat, Rajarshi Gupta, Saumitra Mohan Das
-
Publication number: 20160135755Abstract: A remote home health care system is described.Type: ApplicationFiled: August 19, 2013Publication date: May 19, 2016Inventors: Ping Lu, Shuo Deng, Mengqian Lou, Yi Xie, Zhixin Sun
-
Publication number: 20150331558Abstract: A method for switching pictures of picture galleries and a browser are described. After receiving a picture switching instruction, judging whether an original picture gallery corresponding to an original picture displayed on a picture gallery interface and a target picture gallery corresponding to a target picture are a same gallery. If the original picture gallery and the target picture gallery are different, generating a picture gallery-picture gradual change switch mode. According to the picture gallery-picture gradual change switch mode, switching the original picture displayed on the picture gallery interface to the target picture.Type: ApplicationFiled: November 21, 2013Publication date: November 19, 2015Inventors: Shuo DENG, Chuanchuan BO, Chundong HU, Liang ZENG, Tianyang LIU
-
Publication number: 20150327008Abstract: A method and server updates service information. A service information update request may be received from a mobile terminal device. The service information update request may include a user Identity (ID) of a user. Characteristic information of the user may be determined according to the user ID. Service information may be determined according to the characteristic information of the user and information relating to an area, at which the mobile terminal device may be located. The service information may be sent to the mobile terminal device.Type: ApplicationFiled: June 15, 2015Publication date: November 12, 2015Inventors: Shuo DENG, Jiangquan HUANG, Chuanchuan BO, Jie HOU, Liang ZENG, Chundong HU, Tianyang LIU, Ming HE, Lei CHEN, Fang FANG