Patents by Inventor Stephen Chu
Stephen Chu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12250235Abstract: Techniques for implementing a scalable automated training framework for anomaly and ransomware detection are disclosed. A computer system may instantiate one or more virtual machines (VMs). Each VM may be loaded with a corresponding file system. The computer system may simulate, on the one or more VMs, user actions and ransomware, which may cause changes to the corresponding file systems loaded on to the VMs. The computer system may obtain snapshots of the VMs that indicate changes to the corresponding file system of each of the VMs. The computer system may generate a metadata file for each VM based on the corresponding snapshot. The computer system may generate training data for training a ransomware detection model using a machine learning algorithm based on the metadata files for each of the VMs.Type: GrantFiled: January 29, 2021Date of Patent: March 11, 2025Assignee: Rubrik, Inc.Inventors: Oscar Annen, Sumeet Bharatbhai Varma, Guilherme Vale Ferreira Menezes, Stephen Chu, Mohit Gupta
-
Patent number: 11960920Abstract: A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.Type: GrantFiled: May 11, 2023Date of Patent: April 16, 2024Assignee: Rubrik, Inc.Inventors: Christopher Denny, Li Ding, Linglin Yu, Stephen Chu, Ying Wu
-
Patent number: 11941117Abstract: Techniques unmasking ransomware attacks are disclosed. In some embodiments, a computer system performs operations comprising: generating a first prediction that a file system comprising a plurality of files has been attacked by ransomware based on snapshot metadata of the file system using a snapshot-level machine learning prediction model, the snapshot metadata comprising a plurality of file change data indicating a plurality of file change events that have been performed on the file system; in response to the first prediction, generating a classification for each one of the files based on the file change data using a file-level machine learning prediction model, the classification indicating whether the files have been targeted by the ransomware for encryption; determining that one or more files have been targeted by the ransomware based on the classification; and displaying the classification for the one or more files on a computing device of a user.Type: GrantFiled: January 29, 2021Date of Patent: March 26, 2024Assignee: Rubrik, Inc.Inventors: Oscar Annen, Harish Raman Shanker, Guilherme Vale Ferreira Menezes, Stephen Chu, Mohit Gupta, Sumeet Bharatbhai Varma
-
Publication number: 20240089282Abstract: Techniques for implementing a scalable automated training framework for anomaly and ransomware detection are disclosed. In some embodiments, a computer system performs operations comprising: instantiating a plurality of virtual machines, each one of the virtual machines being loaded with a corresponding file system; simulating user actions and ransomware on the virtual machines, the simulating of user actions and ransomware on the virtual machines causing changes to the corresponding file systems of the virtual machines; for each one of the plurality of virtual machines, generating a corresponding metadata file based on one or more corresponding snapshots of the virtual machine, the one or more corresponding snapshots indicating the changes to the corresponding file system of the virtual machine; and training a ransomware detection model using a machine learning algorithm and training data, the training data being based on the corresponding metadata files of the virtual machines.Type: ApplicationFiled: November 21, 2023Publication date: March 14, 2024Inventors: Oscar Annen, Sumeet Bharatbhai Varma, Guilherme Vale Ferreira Menezes, Stephen Chu, Mohit Gupta
-
Publication number: 20230342492Abstract: Techniques for implementing proactive data security operations for files using an analysis of access permission levels for the files are disclosed. In some embodiments, a computer system performs operations comprising: determining that data of a file includes sensitive information based on an analysis of the data using a data classification model; determining that access to the file is open using an access classification model; and based on the determination that the data of the file includes sensitive information and the determination that the access to the file is open, causing a notification to be displayed on a computing device of a user, the notification comprising an indication that the file includes sensitive information and that access to the file is open.Type: ApplicationFiled: June 30, 2023Publication date: October 26, 2023Inventors: Mohit Gupta, Stephen Chu, Brian Victor Li
-
Publication number: 20230289205Abstract: A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.Type: ApplicationFiled: May 11, 2023Publication date: September 14, 2023Inventors: Christopher Denny, Li Ding, Linglin Yu, Stephen Chu, Ying Wu
-
Patent number: 11741256Abstract: Techniques for implementing proactive data security operations for files using an analysis of access permission levels for the files are disclosed. In some embodiments, a computer system performs operations comprising: determining that data of a file includes sensitive information based on an analysis of the data using a data classification model; determining that access to the file is open using an access classification model; and based on the determination that the data of the file includes sensitive information and the determination that the access to the file is open, causing a notification to be displayed on a computing device of a user, the notification comprising an indication that the file includes sensitive information and that access to the file is open.Type: GrantFiled: January 29, 2021Date of Patent: August 29, 2023Assignee: Rubrik, Inc.Inventors: Mohit Gupta, Stephen Chu, Brian Victor Li
-
Patent number: 11687360Abstract: A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.Type: GrantFiled: July 5, 2022Date of Patent: June 27, 2023Assignee: Rubrik, Inc.Inventors: Christopher Denny, Li Ding, Linglin Yu, Stephen Chu, Ying Wu
-
Publication number: 20220334867Abstract: A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.Type: ApplicationFiled: July 5, 2022Publication date: October 20, 2022Inventors: Christopher Denny, Li Ding, Linglin Yu, Stephen Chu, Ying Wu
-
Publication number: 20220309184Abstract: A method and system include detecting a user activity associated with a file change of a first file, invoking a plurality of analyzers to scan content of the first file, the plurality of analyzers including a first analyzer, matching the first analyzer with a first sensitive data item in the first file, identifying a first policy based on a first pre-determined set of analyzers that includes the first analyzer, and causing display of a first notification in a user interface of a client device, the first notification including a first indication that the first policy may be violated based on the file change associated with the first file.Type: ApplicationFiled: March 26, 2021Publication date: September 29, 2022Inventors: Mohit Gupta, Stephen Chu, Surendar Chandra
-
Patent number: 11429418Abstract: A data management system having a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a shard snapshot of each of the plurality of shards; receiving the shard snapshots asynchronously; ordering the received shard snapshots sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered shard snapshots. The operations may further include maintaining a flow control queue that limits a number of the requested shard snapshots.Type: GrantFiled: July 31, 2019Date of Patent: August 30, 2022Assignee: Rubrik, Inc.Inventors: Christopher Denny, Li Ding, Linglin Yu, Stephen Chu, Ying Wu
-
Patent number: 11429417Abstract: A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.Type: GrantFiled: July 31, 2019Date of Patent: August 30, 2022Assignee: Rubrik, Inc.Inventors: Christopher Denny, Li Ding, Linglin Yu, Stephen Chu, Ying Wu
-
Publication number: 20220245276Abstract: Techniques for implementing proactive data security operations for files using an analysis of access permission levels for the files are disclosed. In some embodiments, a computer system performs operations comprising: determining that data of a file includes sensitive information based on an analysis of the data using a data classification model; determining that access to the file is open using an access classification model; and based on the determination that the data of the file includes sensitive information and the determination that the access to the file is open, causing a notification to be displayed on a computing device of a user, the notification comprising an indication that the file includes sensitive information and that access to the file is open.Type: ApplicationFiled: January 29, 2021Publication date: August 4, 2022Inventors: Mohit Gupta, Stephen Chu, Brian Victor Li
-
Publication number: 20220245245Abstract: Techniques unmasking ransomware attacks are disclosed. In some embodiments, a computer system performs operations comprising: generating a first prediction that a file system comprising a plurality of files has been attacked by ransomware based on snapshot metadata of the file system using a snapshot-level machine learning prediction model, the snapshot metadata comprising a plurality of file change data indicating a plurality of file change events that have been performed on the file system; in response to the first prediction, generating a classification for each one of the files based on the file change data using a file-level machine learning prediction model, the classification indicating whether the files have been targeted by the ransomware for encryption; determining that one or more files have been targeted by the ransomware based on the classification; and displaying the classification for the one or more files on a computing device of a user.Type: ApplicationFiled: January 29, 2021Publication date: August 4, 2022Inventors: Oscar Annen, Harish Raman Shanker, Guilherme Vale Ferreira Menezes, Stephen Chu, Mohit Gupta, Sumeet Bharatbhai Varma
-
Publication number: 20220247766Abstract: Techniques for implementing a scalable automated training framework for anomaly and ransomware detection are disclosed. In some embodiments, a computer system performs operations comprising: instantiating a plurality of virtual machines, each one of the virtual machines being loaded with a corresponding file system; simulating user actions and ransomware on the virtual machines, the simulating of user actions and ransomware on the virtual machines causing changes to the corresponding file systems of the virtual machines; for each one of the plurality of virtual machines, generating a corresponding metadata file based on one or more corresponding snapshots of the virtual machine, the one or more corresponding snapshots indicating the changes to the corresponding file system of the virtual machine; and training a ransomware detection model using a machine learning algorithm and training data, the training data being based on the corresponding metadata files of the virtual machines.Type: ApplicationFiled: January 29, 2021Publication date: August 4, 2022Inventors: Oscar Annen, Sumeet Bharatbhai Varma, Guilherme Vale Ferreira Menezes, Stephen Chu, Mohit Gupta
-
Patent number: 11227341Abstract: A method, system, and computer program storage product determine determining a trajectory information type of a receipt submitted by an employee. Trajectory information associated with the receipt submitted by the employee is retrieved based on the trajectory information type. Trajectory information corresponding to a device associated with the employee is also retrieved. The receipt is determined as a valid receipt in response to the trajectory information associated with the receipt submitted by the employee matching the trajectory information associated with the device associated with the employee.Type: GrantFiled: September 24, 2019Date of Patent: January 18, 2022Assignee: International Business Machines CorporationInventors: Stephen Chu, Min Gong, Dong Sheng Li, Jun Chi Yan, Wei Peng Zhang
-
Publication number: 20210034397Abstract: A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.Type: ApplicationFiled: July 31, 2019Publication date: February 4, 2021Inventors: Christopher Denny, Li Ding, Linglin Yu, Stephen Chu, Ying Wu
-
Publication number: 20210034396Abstract: A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.Type: ApplicationFiled: July 31, 2019Publication date: February 4, 2021Inventors: Christopher Denny, Li Ding, Linglin Yu, Stephen Chu, Ying Wu
-
Publication number: 20210034395Abstract: A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.Type: ApplicationFiled: July 31, 2019Publication date: February 4, 2021Inventors: Christopher Denny, Li Ding, Linglin Yu, Stephen Chu, Ying Wu
-
Publication number: 20200020044Abstract: A method, system, and computer program storage product determine determining a trajectory information type of a receipt submitted by an employee. Trajectory information associated with the receipt submitted by the employee is retrieved based on the trajectory information type. Trajectory information corresponding to a device associated with the employee is also retrieved. The receipt is determined as a valid receipt in response to the trajectory information associated with the receipt submitted by the employee matching the trajectory information associated with the device associated with the employee.Type: ApplicationFiled: September 24, 2019Publication date: January 16, 2020Applicant: International Business Machines CorporationInventors: Stephen CHU, Min GONG, Dong Sheng LI, Jun Chi YAN, Wei Peng ZHANG