Patents by Inventor Wenbin Zheng
Wenbin Zheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11926831Abstract: This invention provides compounds, compositions and methods for modulating the expression of target genes using RNA interference. RNAi structures and molecules of this invention can be used for modulating or silencing the expression of genes, with high levels of RNAi activity and reduced off target actions. Advantageous structures include siRNAs targeted to any gene having one or more 2?-deoxy nucleotides located in the seed region. The RNA interference molecules can be used in methods for preventing or treating diseases.Type: GrantFiled: May 3, 2022Date of Patent: March 12, 2024Assignee: Nitto Denko CorporationInventors: Kenjirou Minomi, Jens Harborth, Cima Cina, Wenbin Ying, Jane Zheng, Narendra Vaish
-
Patent number: 10061926Abstract: A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder.Type: GrantFiled: August 17, 2015Date of Patent: August 28, 2018Assignee: Beijing Qihoo Technology Company LimitedInventors: Wenbin Zheng, Yu Wang
-
Patent number: 10025807Abstract: Acquiring dynamic data is disclosed including extracting a search term from a search request string that is received, looking up the search term in a threshold value dictionary to acquire a dynamic threshold score corresponding to the search term, using the search term as a query condition and the dynamic threshold score corresponding to the search term as a filter condition to acquire, in an index data table, one or more corresponding pieces of index information, acquiring data information corresponding to the search term based on the index information in the index data table, and sending the data information to be displayed in a page of a website. The dynamic threshold score varies based on a characteristic factor.Type: GrantFiled: September 10, 2013Date of Patent: July 17, 2018Assignee: Alibaba Group Holding LimitedInventors: Linfeng Zhang, Peng Huang, Xipu Wang, Wenbin Zheng
-
Patent number: 9916447Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: GrantFiled: September 22, 2015Date of Patent: March 13, 2018Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE (BEIJING) COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
-
Patent number: 9444834Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.Type: GrantFiled: February 4, 2013Date of Patent: September 13, 2016Assignee: Beijing Qihoo Technology Company LimitedInventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
-
Publication number: 20160012224Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: ApplicationFiled: September 22, 2015Publication date: January 14, 2016Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Hongyi ZHOU, Wenbin ZHENG, He YU, Paul FAN
-
Publication number: 20150356298Abstract: A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder.Type: ApplicationFiled: August 17, 2015Publication date: December 10, 2015Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Wenbin ZHENG, Yu WANG
-
Patent number: 9177141Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: GrantFiled: August 8, 2011Date of Patent: November 3, 2015Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE(BEIJING) COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
-
Patent number: 9152792Abstract: A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder.Type: GrantFiled: June 21, 2012Date of Patent: October 6, 2015Assignee: Beijing Qihoo Technology Company LimitedInventors: Wenbin Zheng, Yu Wang
-
Publication number: 20150207810Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.Type: ApplicationFiled: February 4, 2013Publication date: July 23, 2015Inventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
-
Publication number: 20140317733Abstract: A method and client for ensuring user network security, the method comprising: detecting whether a user opens a login operation mode or payment operation mode via a client; and when detecting that the user opens the login operation mode or payment operation mode, performing security monitoring for the login procedure or payment procedure of the user according to a preset security strategy. By applying the embodiment of the present invention, when a client user is in a login procedure or online payment procedure, security protection can be implemented for the login procedure or payment procedure via multiple security strategies specially used for ensuring the login procedure or payment procedure, and network security is ensured for the user during the login procedure or payment procedure via risky process interception, executable file prompt and browser invoke monitoring.Type: ApplicationFiled: April 17, 2012Publication date: October 23, 2014Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Ningyi Chen, Wenbin Zheng, Peng Xiao, Yipeng Zhu
-
Publication number: 20140137252Abstract: A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder.Type: ApplicationFiled: June 21, 2012Publication date: May 15, 2014Applicant: BEIJING QIHOOD TECHNOLOGY COMPANY LIMITEDInventors: Wenbin Zheng, Yu Wang
-
Publication number: 20140074851Abstract: Embodiments of the present application relate to a dynamic data acquisition method, a dynamic data acquisition system, and a computer program product for dynamically acquiring data. A dynamic data acquisition method is provided. The method includes extracting a search term from a search request string that is received, looking up the search term in a threshold value dictionary to acquire a dynamic threshold score corresponding to the search term, using the search term as a query condition and the dynamic threshold score corresponding to the search term as a filter condition to acquire, in an index data table, one or more corresponding pieces of index information, acquiring data information corresponding to the search term based on the index information in the index data table, and sending the data information to be displayed in a page of a website. The dynamic threshold score varies based on a characteristic factor.Type: ApplicationFiled: September 10, 2013Publication date: March 13, 2014Applicant: Alibaba Group Holding LimitedInventors: Linfeng Zhang, Peng Huang, Xipu Wang, Wenbin Zheng
-
Publication number: 20130174257Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: ApplicationFiled: August 8, 2011Publication date: July 4, 2013Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
-
Patent number: D986001Type: GrantFiled: May 26, 2021Date of Patent: May 16, 2023Assignee: Dongguan Mai Ya Tang Plastic Technology Co., LtdInventor: Wenbin Zheng
-
Patent number: D992965Type: GrantFiled: May 26, 2021Date of Patent: July 25, 2023Assignee: Dongguan Mai Ya Tang Plastic Technology Co., Ltd.Inventor: Wenbin Zheng