Patents by Inventor Wenbin Zheng

Wenbin Zheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11926831
    Abstract: This invention provides compounds, compositions and methods for modulating the expression of target genes using RNA interference. RNAi structures and molecules of this invention can be used for modulating or silencing the expression of genes, with high levels of RNAi activity and reduced off target actions. Advantageous structures include siRNAs targeted to any gene having one or more 2?-deoxy nucleotides located in the seed region. The RNA interference molecules can be used in methods for preventing or treating diseases.
    Type: Grant
    Filed: May 3, 2022
    Date of Patent: March 12, 2024
    Assignee: Nitto Denko Corporation
    Inventors: Kenjirou Minomi, Jens Harborth, Cima Cina, Wenbin Ying, Jane Zheng, Narendra Vaish
  • Patent number: 10061926
    Abstract: A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder.
    Type: Grant
    Filed: August 17, 2015
    Date of Patent: August 28, 2018
    Assignee: Beijing Qihoo Technology Company Limited
    Inventors: Wenbin Zheng, Yu Wang
  • Patent number: 10025807
    Abstract: Acquiring dynamic data is disclosed including extracting a search term from a search request string that is received, looking up the search term in a threshold value dictionary to acquire a dynamic threshold score corresponding to the search term, using the search term as a query condition and the dynamic threshold score corresponding to the search term as a filter condition to acquire, in an index data table, one or more corresponding pieces of index information, acquiring data information corresponding to the search term based on the index information in the index data table, and sending the data information to be displayed in a page of a website. The dynamic threshold score varies based on a characteristic factor.
    Type: Grant
    Filed: September 10, 2013
    Date of Patent: July 17, 2018
    Assignee: Alibaba Group Holding Limited
    Inventors: Linfeng Zhang, Peng Huang, Xipu Wang, Wenbin Zheng
  • Patent number: 9916447
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: March 13, 2018
    Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE (BEIJING) COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
  • Patent number: 9444834
    Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.
    Type: Grant
    Filed: February 4, 2013
    Date of Patent: September 13, 2016
    Assignee: Beijing Qihoo Technology Company Limited
    Inventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
  • Publication number: 20160012224
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Application
    Filed: September 22, 2015
    Publication date: January 14, 2016
    Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi ZHOU, Wenbin ZHENG, He YU, Paul FAN
  • Publication number: 20150356298
    Abstract: A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder.
    Type: Application
    Filed: August 17, 2015
    Publication date: December 10, 2015
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Wenbin ZHENG, Yu WANG
  • Patent number: 9177141
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: November 3, 2015
    Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE(BEIJING) COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
  • Patent number: 9152792
    Abstract: A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: October 6, 2015
    Assignee: Beijing Qihoo Technology Company Limited
    Inventors: Wenbin Zheng, Yu Wang
  • Publication number: 20150207810
    Abstract: The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively.
    Type: Application
    Filed: February 4, 2013
    Publication date: July 23, 2015
    Inventors: Wenbin Zheng, Paul Fan, Jianhua Lu, Xiaolin Zhang
  • Publication number: 20140317733
    Abstract: A method and client for ensuring user network security, the method comprising: detecting whether a user opens a login operation mode or payment operation mode via a client; and when detecting that the user opens the login operation mode or payment operation mode, performing security monitoring for the login procedure or payment procedure of the user according to a preset security strategy. By applying the embodiment of the present invention, when a client user is in a login procedure or online payment procedure, security protection can be implemented for the login procedure or payment procedure via multiple security strategies specially used for ensuring the login procedure or payment procedure, and network security is ensured for the user during the login procedure or payment procedure via risky process interception, executable file prompt and browser invoke monitoring.
    Type: Application
    Filed: April 17, 2012
    Publication date: October 23, 2014
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Ningyi Chen, Wenbin Zheng, Peng Xiao, Yipeng Zhu
  • Publication number: 20140137252
    Abstract: A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder.
    Type: Application
    Filed: June 21, 2012
    Publication date: May 15, 2014
    Applicant: BEIJING QIHOOD TECHNOLOGY COMPANY LIMITED
    Inventors: Wenbin Zheng, Yu Wang
  • Publication number: 20140074851
    Abstract: Embodiments of the present application relate to a dynamic data acquisition method, a dynamic data acquisition system, and a computer program product for dynamically acquiring data. A dynamic data acquisition method is provided. The method includes extracting a search term from a search request string that is received, looking up the search term in a threshold value dictionary to acquire a dynamic threshold score corresponding to the search term, using the search term as a query condition and the dynamic threshold score corresponding to the search term as a filter condition to acquire, in an index data table, one or more corresponding pieces of index information, acquiring data information corresponding to the search term based on the index information in the index data table, and sending the data information to be displayed in a page of a website. The dynamic threshold score varies based on a characteristic factor.
    Type: Application
    Filed: September 10, 2013
    Publication date: March 13, 2014
    Applicant: Alibaba Group Holding Limited
    Inventors: Linfeng Zhang, Peng Huang, Xipu Wang, Wenbin Zheng
  • Publication number: 20130174257
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Application
    Filed: August 8, 2011
    Publication date: July 4, 2013
    Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
  • Patent number: D986001
    Type: Grant
    Filed: May 26, 2021
    Date of Patent: May 16, 2023
    Assignee: Dongguan Mai Ya Tang Plastic Technology Co., Ltd
    Inventor: Wenbin Zheng
  • Patent number: D992965
    Type: Grant
    Filed: May 26, 2021
    Date of Patent: July 25, 2023
    Assignee: Dongguan Mai Ya Tang Plastic Technology Co., Ltd.
    Inventor: Wenbin Zheng