Patents by Inventor Sounil Yu
Sounil Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10551851Abstract: An autonomous unmanned road vehicle and how it can be used to make deliveries. The unmanned vehicle is capable of operating autonomously on paved roadways. The vehicle has a control system for autonomous driving and a perception system for detecting objects in its surroundings. The vehicle also has one or more cargo compartments for carrying the delivery items. The vehicle may have a flashing light beacon to increase the conspicuousness of the vehicle. In consideration that the vehicle does not carry passengers, the size and/or motor power of the vehicle may be reduced as compared to conventional passenger vehicles.Type: GrantFiled: June 29, 2014Date of Patent: February 4, 2020Inventors: Steven Sounyoung Yu, Sounil Yu
-
Publication number: 20190004539Abstract: An autonomous unmanned road vehicle and how it can be used to make deliveries. The unmanned vehicle is capable of operating autonomously on paved roadways. The vehicle has a control system for autonomous driving and a perception system for detecting objects in its surroundings. The vehicle also has one or more cargo compartments for carrying the delivery items. The vehicle may have a flashing light beacon to increase the conspicuousness of the vehicle. In consideration that the vehicle does not carry passengers, the size and/or motor power of the vehicle may be reduced as compared to conventional passenger vehicles.Type: ApplicationFiled: August 22, 2018Publication date: January 3, 2019Inventors: Steven Sounyoung Yu, Sounil Yu
-
Patent number: 10135867Abstract: Disclosed is a computerized system for dynamically updating a honeypot computer environment. The system typically includes a processor, a memory, and a honeypot management module stored in the memory. The system for is typically configured for: creating a honeypot environment within a computer network, the honeypot environment comprising a software application, wherein the computer network has one or more other environments, the honeypot environment being isolated from the other environments of the computer network; receiving an update to the software application for implementation in at least one of the other environments of the computer network; and, based on receiving the update to the software application for implementation in at least one of the other environments of the computer network, automatically implementing the update to the software application within the honeypot environment.Type: GrantFiled: December 8, 2015Date of Patent: November 20, 2018Assignee: Bank of America CorporationInventor: Sounil Yu
-
Publication number: 20180239363Abstract: An autonomous unmanned road vehicle and how it can be used to make deliveries. The unmanned vehicle is capable of operating autonomously on paved roadways. The vehicle has a control system for autonomous driving and a perception system for detecting objects in its surroundings. The vehicle also has one or more cargo compartments for carrying the delivery items. The vehicle may have a flashing light beacon to increase the conspicuousness of the vehicle. In consideration that the vehicle does not carry passengers, the size and/or motor power of the vehicle may be reduced as compared to conventional passenger vehicles.Type: ApplicationFiled: April 21, 2018Publication date: August 23, 2018Inventors: Steven Sounyoung Yu, Sounil Yu
-
Patent number: 10049193Abstract: Disclosed is a computerized system for neutralizing misappropriated electronic files. The system typically includes a processor, a memory, and an electronic file neutralizing module stored in the memory. The system is typically configured for: determining that a first electronic file has been misappropriated; determining one or more identifying characteristics of the first electronic file; creating a second electronic file, wherein the second electronic file has different content than the first electronic file but comprises the one or more identifying characteristics of the first electronic file; and submitting the second electronic file to a third party providing a content inspection system that neutralizes malicious electronic documents.Type: GrantFiled: January 4, 2016Date of Patent: August 14, 2018Assignee: Bank of America CorporationInventor: Sounil Yu
-
Publication number: 20180224867Abstract: An autonomous unmanned road vehicle and how it can be used to make deliveries. The unmanned vehicle is capable of operating autonomously on paved roadways. The vehicle has a control system for autonomous driving and a perception system for detecting objects in its surroundings. The vehicle also has one or more cargo compartments for carrying the delivery items. The vehicle may have a flashing light beacon to increase the conspicuousness of the vehicle. In consideration that the vehicle does not carry passengers, the size and/or motor power of the vehicle may be reduced as compared to conventional passenger vehicles.Type: ApplicationFiled: February 24, 2018Publication date: August 9, 2018Inventors: Steven Yu, Sounil Yu
-
Publication number: 20180203464Abstract: An autonomous unmanned road vehicle and how it can be used to make deliveries. The unmanned vehicle is capable of operating autonomously on paved roadways. The vehicle has a control system for autonomous driving and a perception system for detecting objects in its surroundings. The vehicle also has one or more cargo compartments for carrying the delivery items. The vehicle may have a flashing light beacon to increase the conspicuousness of the vehicle. In consideration that the vehicle does not carry passengers, the size and/or motor power of the vehicle may be reduced as compared to conventional passenger vehicles.Type: ApplicationFiled: March 11, 2018Publication date: July 19, 2018Inventors: Steven Sounyoung Yu, Sounil Yu
-
Publication number: 20180157274Abstract: An autonomous unmanned road vehicle and how it can be used to make deliveries. The unmanned vehicle is capable of operating autonomously on paved roadways. The vehicle has a control system for autonomous driving and a perception system for detecting objects in its surroundings. The vehicle also has one or more cargo compartments for carrying the delivery items. The vehicle may have a flashing light beacon to increase the conspicuousness of the vehicle. In consideration that the vehicle does not carry passengers, the size and/or motor power of the vehicle may be reduced as compared to conventional passenger vehicles.Type: ApplicationFiled: January 16, 2018Publication date: June 7, 2018Inventors: Steven Sounyoung Yu, Sounil Yu
-
Patent number: 9948652Abstract: Systems, computer program products, and methods are described herein for identifying threat vectors and implementing controls for securing resources within a network. The present invention is configured to determine one or more threat vectors associated with the resource; determine one or more controls associated with each of the one or more threat vectors associated with the resource; determine whether the one or more controls associated with the at least one of the one or more threat vectors is capable of detecting the access by an external computing device via at least one of the one or more types of access; and dynamically generate a graphical representation of the resource and the one or more threat vectors based on at least the received analysis request.Type: GrantFiled: May 16, 2016Date of Patent: April 17, 2018Assignee: Bank of America CorporationInventors: Sounil Yu, Brandon Matthew Sloane
-
Publication number: 20170359367Abstract: Disclosed is a computerized system for determining the collective effectiveness of information security technologies. The system typically includes a processor, a memory, and an information security analysis module stored in the memory. The system for is typically configured for: determining a security score for each element of a security technology defense matrix, a first dimension of the security technology defense matrix corresponding to a plurality of resource classes, and a second dimension of the security technology defense matrix corresponding to a plurality of security operational functions; determining a defense-in-depth score for each resource class and each security operational function; determining an aggregate security score; and providing the aggregate security score the defense-in-depth scores for each resource class and each security operational function to a user computing device. The system may be configured to provide technology deployment recommendations.Type: ApplicationFiled: August 3, 2017Publication date: December 14, 2017Inventor: Sounil Yu
-
Patent number: 9843600Abstract: Disclosed is a computerized system for determining the collective effectiveness of information security technologies. The system typically includes a processor, a memory, and an information security analysis module stored in the memory. The system for is typically configured for: determining a security score for each element of a security technology defense matrix, a first dimension of the security technology defense matrix corresponding to a plurality of resource classes, and a second dimension of the security technology defense matrix corresponding to a plurality of security operational functions; determining a defense-in-depth score for each resource class and each security operational function; determining an aggregate security score; and providing the aggregate security score the defense-in-depth scores for each resource class and each security operational function to a user computing device. The system may be configured to provide technology deployment recommendations.Type: GrantFiled: August 3, 2017Date of Patent: December 12, 2017Assignee: Bank of America CorporationInventor: Sounil Yu
-
Patent number: 9836605Abstract: Disclosed is a computerized system for detecting unauthorized code in a software application. The system typically includes a processor, a memory, and a software analysis module stored in the memory. The system for is typically configured for: executing a software application in a development environment and in a production environment; monitoring execution of the software application in the development environment and in the production environment; comparing the execution of the software application in the development environment and the execution of the software application in the production environment; identifying a discrepancy between the execution of the software application in the development environment and the execution of the software application in the production environment; and, based on identifying the discrepancy, transmitting an alert to a user computing device. Unauthorized code associated with the discrepancy may then be removed from the software application.Type: GrantFiled: December 8, 2015Date of Patent: December 5, 2017Assignee: Bank of America CorporationInventor: Sounil Yu
-
Patent number: 9832201Abstract: Systems, computer program products, and methods are described herein for creating reusable resource-centric threat models and identifying controls for securing resources within a network. The present invention is configured to determine that an internal resource in a network requires protection from unauthorized external access; electronically receive information associated with the internal resource within the network; determine one or more threat vectors associated with the internal resource; electronically retrieve from a controls library, a control template associated with a resource category matching the resource category of the internal resource; and apply the control template to the internal resource.Type: GrantFiled: May 16, 2016Date of Patent: November 28, 2017Assignee: Bank of America CorporationInventors: Sounil Yu, Brandon Matthew Sloane
-
Patent number: 9825983Abstract: Disclosed is a computerized system for determining the collective effectiveness of information security technologies. The system typically includes a processor, a memory, and an information security analysis module stored in the memory. The system for is typically configured for: determining a security score for each element of a security technology defense matrix, a first dimension of the security technology defense matrix corresponding to a plurality of resource classes, and a second dimension of the security technology defense matrix corresponding to a plurality of security operational functions; determining a defense-in-depth score for each resource class and each security operational function; determining an aggregate security score; and providing the aggregate security score the defense-in-depth scores for each resource class and each security operational function to a user computing device. The system may be configured to provide technology deployment recommendations.Type: GrantFiled: August 3, 2017Date of Patent: November 21, 2017Assignee: Bank of America CorporationInventor: Sounil Yu
-
Publication number: 20170331835Abstract: Systems, computer program products, and methods are described herein for creating reusable resource-centric threat models and identifying controls for securing resources within a network. The present invention is configured to determine that an internal resource in a network requires protection from unauthorized external access; electronically receive information associated with the internal resource within the network; determine one or more threat vectors associated with the internal resource; electronically retrieve from a controls library, a control template associated with a resource category matching the resource category of the internal resource; and apply the control template to the internal resource.Type: ApplicationFiled: May 16, 2016Publication date: November 16, 2017Inventors: Sounil Yu, Brandon Matthew Sloane
-
Publication number: 20170331852Abstract: Disclosed is a computerized system for determining the collective effectiveness of information security technologies. The system typically includes a processor, a memory, and an information security analysis module stored in the memory. The system for is typically configured for: determining a security score for each element of a security technology defense matrix, a first dimension of the security technology defense matrix corresponding to a plurality of resource classes, and a second dimension of the security technology defense matrix corresponding to a plurality of security operational functions; determining a defense-in-depth score for each resource class and each security operational function; determining an aggregate security score; and providing the aggregate security score the defense-in-depth scores for each resource class and each security operational function to a user computing device. The system may be configured to provide technology deployment recommendations.Type: ApplicationFiled: August 3, 2017Publication date: November 16, 2017Inventor: Sounil Yu
-
Publication number: 20170331849Abstract: Systems, computer program products, and methods are described herein for identifying threat vectors and implementing controls for securing resources within a network. The present invention is configured to determine one or more threat vectors associated with the resource; determine one or more controls associated with each of the one or more threat vectors associated with the resource; determine whether the one or more controls associated with the at least one of the one or more threat vectors is capable of detecting the access by an external computing device via at least one of the one or more types of access; and dynamically generate a graphical representation of the resource and the one or more threat vectors based on at least the received analysis request.Type: ApplicationFiled: May 16, 2016Publication date: November 16, 2017Inventors: Sounil Yu, Brandon Matthew Sloane
-
Publication number: 20170308098Abstract: An autonomous unmanned road vehicle and how it can be used to make deliveries. The unmanned vehicle is capable of operating autonomously on paved roadways. The vehicle has a control system for autonomous driving and a perception system for detecting objects in its surroundings. The vehicle also has one or more cargo compartments for carrying the delivery items. The vehicle may have a flashing light beacon to increase the conspicuousness of the vehicle. In consideration that the vehicle does not carry passengers, the size and/or motor power of the vehicle may be reduced as compared to conventional passenger vehicles.Type: ApplicationFiled: July 13, 2017Publication date: October 26, 2017Inventors: Steven Sounyoung Yu, Sounil Yu
-
Patent number: 9800607Abstract: Disclosed is a computerized system for determining the collective effectiveness of information security technologies. The system typically includes a processor, a memory, and an information security analysis module stored in the memory. The system for is typically configured for: determining a security score for each element of a security technology defense matrix, a first dimension of the security technology defense matrix corresponding to a plurality of resource classes, and a second dimension of the security technology defense matrix corresponding to a plurality of security operational functions; determining a defense-in-depth score for each resource class and each security operational function; determining an aggregate security score; and providing the aggregate security score the defense-in-depth scores for each resource class and each security operational function to a user computing device. The system may be configured to provide technology deployment recommendations.Type: GrantFiled: December 21, 2015Date of Patent: October 24, 2017Assignee: Bank of America CorporationInventor: Sounil Yu
-
Publication number: 20170193203Abstract: Disclosed is a computerized system for neutralizing misappropriated electronic files. The system typically includes a processor, a memory, and an electronic file neutralizing module stored in the memory. The system is typically configured for: determining that a first electronic file has been misappropriated; determining one or more identifying characteristics of the first electronic file; creating a second electronic file, wherein the second electronic file has different content than the first electronic file but comprises the one or more identifying characteristics of the first electronic file; and submitting the second electronic file to a third party providing a content inspection system that neutralizes malicious electronic documents.Type: ApplicationFiled: January 4, 2016Publication date: July 6, 2017Inventor: Sounil Yu