Patents by Inventor Weifei Zeng
Weifei Zeng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240106846Abstract: Detecting anomalous behavior using a browser extension, including: gathering first information describing activity associated with a user and generated by a browser extension on a user device; gathering second information describing activity associated with the user and generated by an application executed on the user device; and determining, based on the first information and the second information, whether the user has deviated from normal activity.Type: ApplicationFiled: October 20, 2022Publication date: March 28, 2024Inventors: VIKRAM KAPOOR, HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, THERON TOCK, YING XIE, HOANG VIET NGUYEN, YIJOU CHEN
-
Patent number: 11916947Abstract: Generating user-specific polygraphs for network activity, including: gathering information describing network activity associated with a user and generating, based on the information, a user-specific polygraph that includes one or more destinations associated with the network activity.Type: GrantFiled: July 6, 2022Date of Patent: February 27, 2024Assignee: LACEWORK, INC.Inventors: Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie, Yijou Chen
-
Patent number: 11909752Abstract: Detecting deviations from typical user behavior, including: identifying a geographic location of a device that is associated with a user; determining device activity associated with the user; and detecting, based on a profile associated with the user, that the device activity associated with the user deviates from normal activity for the user.Type: GrantFiled: July 5, 2022Date of Patent: February 20, 2024Assignee: LACEWORK, INC.Inventors: Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie, Yijou Chen
-
Patent number: 11895135Abstract: Detecting anomalous behavior of a device, including: generating, using information describing historical activity associated with a user device, a trained model for detecting normal activity for the user device; gathering information describing current activity associated with the user device; and determining, by using the information describing current activity associated with the user device as input to the trained model, whether the user device has deviated from normal activity.Type: GrantFiled: July 6, 2022Date of Patent: February 6, 2024Assignee: LACEWORK, INC.Inventors: Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie, Yijou Chen
-
Publication number: 20230328086Abstract: Detecting anomalous behavior using a browser extension, including: gathering first information describing activity associated with a user and generated by a browser extension on a user device; gathering second information describing activity associated with the user and generated by an application executed on the user device; and determining, based on the first information and the second information, whether the user has deviated from normal activity.Type: ApplicationFiled: July 6, 2022Publication date: October 12, 2023Inventors: VIKRAM KAPOOR, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie, Yijou Chen
-
Publication number: 20230319092Abstract: Methods, systems, and products for offline workflows in an edge-based data platform, including: accessing log data describing activity associated with a user; generating, based on the log data, one or more alerts; and initiating, based on the one or more alerts, a workflow to acknowledge the one or more alerts by the user.Type: ApplicationFiled: May 26, 2023Publication date: October 5, 2023Inventors: WEIFEI ZENG, HARISH KUMAR BHARAT SINGH, THERON TOCK, YING XIE, VIKRAM KAPOOR, VIMALKUMAR JEYAKUMAR, YIJOU CHEN
-
Patent number: 11765046Abstract: This disclosure provides solutions for automatically grouping network devices (e.g., endpoints) into clusters based on device characteristics. In some aspects, the disclosed technology also provides solutions for generating user selectable queries based on cluster characteristics. A process of the disclosed technology can include steps for identifying one or more device characteristics associated with a first network device, identifying one or more cluster characteristics for each of a first cluster and a second cluster, and comparing the device characteristics associated with the first network device with the one or more cluster characteristics for the first cluster and the second cluster. The process can further include steps for adding the first network device to the first cluster based on the cluster characteristics for the first cluster and the device characteristics for the first network device. Systems and machine-readable media are also provided.Type: GrantFiled: November 13, 2018Date of Patent: September 19, 2023Assignee: Cisco Technology, Inc.Inventors: Weifei Zeng, Omid Madani, Varun Malhotra, Paul Mach, Yash Vipul Doshi, Sayeed Mohammed Tasnim, Thanh Nhan Thi Nguyen, Navindra Yadav, Shashi Gandham
-
Publication number: 20230254330Abstract: Distinguishing user-initiated activity from application-initiated activity, including: gathering first information generated by a browser extension of a browser executed on a user device, wherein the first information describes activity associated with the browser; gathering second information generated by a client application executed on the user device, wherein the second information describes activity associated with the user device; and determining whether a user has deviated from normal activity by determining, based on the first information, whether at least a portion of the activity described in the second information comprises user-initiated activity or browser-initiated activity.Type: ApplicationFiled: January 31, 2023Publication date: August 10, 2023Inventors: HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, CONOR HAYES, VARUN S. MALHOTRA, THERON TOCK, YIJOU CHEN
-
Patent number: 11627166Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for discovering policy scopes within an enterprise network and managing network policies for discovered policy scopes. In one aspect, a method includes identifying one or more communities of devices in an enterprise network; defining, from the one or more communities of devices, policy scopes in the enterprise network; generating a hierarchical representation of the policy scopes; identifying, based on the hierarchical representation of the policy scopes, one or more policies governing traffic flow between devices associated with each of the policy scopes; and managing application of the one or more policies at the devices.Type: GrantFiled: October 6, 2020Date of Patent: April 11, 2023Assignee: Cisco Technology, Inc.Inventors: Weifei Zeng, Sai Ankith Averineni, Omid Madani, Paul Mach, Yash Vipul Doshi, Sasidhar Evuru, Sayeed Mohammed Tasnim, Sameer Salim Mahomed Ali Ladiwala, Chakradhar Reddy Vangeti, Thanh Nhan Nguyen, Varun Malhotra, Shashidhar Gandham, Navindra Yadav, Thanh Trung Ngo, Maxwell Aaron Mechanic
-
Publication number: 20220400129Abstract: Detecting anomalous behavior of a device, including: generating, using information describing historical activity associated with a user device, a trained model for detecting normal activity for the user device; gathering information describing current activity associated with the user device; and determining, by using the information describing current activity associated with the user device as input to the trained model, whether the user device has deviated from normal activity.Type: ApplicationFiled: July 6, 2022Publication date: December 15, 2022Inventors: VIKRAM KAPOOR, HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, THERON TOCK, YING XIE, YIJOU CHEN
-
Publication number: 20220400130Abstract: Generating user-specific polygraphs for network activity, including: gathering information describing network activity associated with a user and generating, based on the information, a user-specific polygraph that includes one or more destinations associated with the network activity.Type: ApplicationFiled: July 6, 2022Publication date: December 15, 2022Inventors: VIKRAM KAPOOR, HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, THERON TOCK, YING XIE, YIJOU CHEN
-
Patent number: 11463483Abstract: Disclosed herein are methods, systems, and non-transitory computer-readable storage media for scoring network segmentation policies in order to determine their effectiveness before, during and after enforcement. In one aspect, a method includes identifying one or more applications within an enterprise network; identifying at least one network security policy in association with the one or more applications within the enterprise network; determining a score of the network security policy based on information corresponding to exposure of each of the one or more applications within the enterprise network; and executing the network security policy based on the score.Type: GrantFiled: July 6, 2020Date of Patent: October 4, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Alok Lalit Wadhwa, James Gabriel Fontenot, Ashutosh Kulshreshtha, Navindra Yadav, Shashidhar Gandham, Weifei Zeng
-
Publication number: 20220232025Abstract: Detecting anomalous behavior of a device, including: generating, using information describing historical activity associated with a user device, a trained model for detecting normal activity for the user device; gathering information describing current activity associated with the user device; and determining, by using the information describing current activity associated with the user device as input to the trained model, whether the user device has deviated from normal activity.Type: ApplicationFiled: March 25, 2022Publication date: July 21, 2022Inventors: VIKRAM KAPOOR, HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, THERON TOCK, YING XIE, YIJOU CHEN
-
Publication number: 20220232024Abstract: Detecting deviations from typical user behavior, including: identifying a geographic location of a device that is associated with a user; determining device activity associated with the user; and detecting, based on a profile associated with the user, that the device activity associated with the user deviates from normal activity for the user.Type: ApplicationFiled: March 25, 2022Publication date: July 21, 2022Applicant: LACEWORK, INC.Inventors: VIKRAM KAPOOR, HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, THERON TOCK, YING XIE, YIJOU CHEN
-
Publication number: 20220224707Abstract: Establishing a location profile for a user device, including: gathering information associated with the location of a user device; determining, based on the information associated with the location of a user device, whether the user device is being accessed at a known location; responsive to determining that the user device is being accessed at a known location: determining a characterization of the known location; and determining, based on the characterization of the known location, whether device utilization is anomalous; and responsive to determining that the user device is not being accessed at a known location: determining a characterization of the unknown location; and determining, based on the characterization of the unknown location, whether device utilization is anomalous.Type: ApplicationFiled: March 25, 2022Publication date: July 14, 2022Inventors: VIKRAM KAPOOR, HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, THERON TOCK, YING XIE, YIJOU CHEN
-
Publication number: 20220109701Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for discovering policy scopes within an enterprise network and managing network policies for discovered policy scopes. In one aspect, a method includes identifying one or more communities of devices in an enterprise network; defining, from the one or more communities of devices, policy scopes in the enterprise network; generating a hierarchical representation of the policy scopes; identifying, based on the hierarchical representation of the policy scopes, one or more policies governing traffic flow between devices associated with each of the policy scopes; and managing application of the one or more policies at the devices.Type: ApplicationFiled: October 6, 2020Publication date: April 7, 2022Inventors: Weifei Zeng, Sai Ankith Averineni, Omid Madani, Paul Mach, Yash Vipul Doshi, Sasidhar Evuru, Sayeed Mohammed Tasnim, Sameer Salim Mahomed Ali Ladiwala, Chakradhar Reddy Vangeti, Thanh Nhan Nguyen, Varun Malhotra, Shashidhar Gandham, Navindra Yadav, Thanh Trung Ngo, Maxwell Aaron Mechanic
-
Publication number: 20220006842Abstract: Disclosed herein are methods, systems, and non-transitory computer-readable storage media for scoring network segmentation policies in order to determine their effectiveness before, during and after enforcement.Type: ApplicationFiled: July 6, 2020Publication date: January 6, 2022Inventors: Alok Lalit Wadhwa, James Gabriel Fontenot, Ashutosh Kulshreshtha, Navindra Yadav, Shashidhar Gandham, Weifei Zeng
-
Publication number: 20180278498Abstract: A application and network analytics platform can capture telemetry (e.g., flow data, server data, process data, user data, policy data, etc.) within a network. The application and network analytics platform can determine flows between servers (physical and virtual servers), server configuration information, and the processes that generated the flows from the telemetry. The application and network analytics platform can compute feature vectors for the processes. The application and network analytics platform can utilize the feature vectors to assess various degrees of functional similarity among the processes. These relationships can form a hierarchical graph providing different application perspectives, from a coarse representation in which the entire data center can be a “root application” to a fine representation in which it may be possible to view the individual processes running on each server.Type: ApplicationFiled: March 23, 2017Publication date: September 27, 2018Inventors: Weifei Zeng, Ali Parandehgheibi, Vimal Jeyakumar, Omid Madani, Navindra Yadav
-
Patent number: 10009259Abstract: Techniques, devices, systems, and protocols are disclosed herein that relate to data transfer between communication nodes via multiple heterogeneous paths. In various embodiments, network coding may be used to improve data flow and reliability in a multiple path scenario. Transmission control protocol (TCP) may also be used within different paths to further enhance data transfer reliability. In some embodiments, multiple levels of network coding may be provided within a transmitter in a multiple path scenario, with one level being applied across all paths and another being applied within individual paths.Type: GrantFiled: November 22, 2016Date of Patent: June 26, 2018Assignee: Massachusetts Institute of TechnologyInventors: Flavio du Pin Calmon, Jason M. Cloud, Muriel Médard, Weifei Zeng
-
Publication number: 20170237652Abstract: Techniques, devices, systems, and protocols are disclosed herein that relate to data transfer between communication nodes via multiple heterogeneous paths. In various embodiments, network coding may be used to improve data flow and reliability in a multiple path scenario. Transmission control protocol (TCP) may also be used within different paths to further enhance data transfer reliability. In some embodiments, multiple levels of network coding may be provided within a transmitter in a multiple path scenario, with one level being applied across all paths and another being applied within individual paths.Type: ApplicationFiled: November 22, 2016Publication date: August 17, 2017Inventors: Flavio du Pin Calmon, Jason M. Cloud, Muriel Médard, Weifei Zeng