Patents by Inventor Yichong Lin

Yichong Lin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10769001
    Abstract: Process states of computing devices may be obtained and processed. Process event information of a computing device may be obtained. The process event information may characterize states of processes of the computing device. The process event information may be stored within a queue. Graph information may be determined based on the process event information within the queue. The graph information may characterize states of processes of the computing device using nodes and edges. The graph information may be stored within a graph database.
    Type: Grant
    Filed: March 21, 2018
    Date of Patent: September 8, 2020
    Assignee: DiDi Research America, LLC
    Inventors: Dong Li, Huaiyu Zhu, Jing Chen, Michael Lin, Shray Kapoor, Yichong Lin
  • Patent number: 10747591
    Abstract: Process states of computing devices may be collected for processing. Process event information of a first computing device may be determined based on an observation of process creation events and process termination events, a garbage collection, and a process scan. The process event information may be provided to a second computing device.
    Type: Grant
    Filed: March 21, 2018
    Date of Patent: August 18, 2020
    Assignee: DiDi Research America, LLC
    Inventors: Dong Li, Huaiyu Zhu, Jing Chen, Michael Lin, Shray Kapoor, Yichong Lin
  • Publication number: 20190294482
    Abstract: Process states of computing devices may be obtained and processed. Process event information of a computing device may be obtained. The process event information may characterize states of processes of the computing device. The process event information may be stored within a queue. Graph information may be determined based on the process event information within the queue. The graph information may characterize states of processes of the computing device using nodes and edges. The graph information may be stored within a graph database.
    Type: Application
    Filed: March 21, 2018
    Publication date: September 26, 2019
    Inventors: Dong LI, Huaiyu ZHU, Jing CHEN, Michael LIN, Shray KAPOOR, Yichong LIN
  • Publication number: 20190294481
    Abstract: Process states of computing devices may be collected for processing. Process event information of a first computing device may be determined based on an observation of process creation events and process termination events, a garbage collection, and a process scan. The process event information may be provided to a second computing device.
    Type: Application
    Filed: March 21, 2018
    Publication date: September 26, 2019
    Inventors: Dong LI, Huaiyu ZHU, Jing CHEN, Michael LIN, Shray KAPOOR, Yichong LIN
  • Patent number: 10192052
    Abstract: According to one embodiment, a computerized method comprises conducting a first static scan on content within a file. Thereafter, if the first static scan did not result in the file being classified as malicious, the file is deconstructed to gain access to one or more objects within the file. A second static scan associated with the one or more objects is performed to determine whether the one or more objects are suspected of including malware. The file may then be classified as malicious based on results of the second static scan.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: January 29, 2019
    Assignee: FireEye, Inc.
    Inventors: Abhishek Singh, Yichong Lin, Angshuman Mukherjee, Zheng Bu
  • Patent number: 10140451
    Abstract: A method is provided in one example embodiment and includes initiating an execution of a compiled script, evaluating a function called in the compiled script, detecting an execution event based on at least a first criterion, and storing information associated with the execution event in an execution event queue. The method also includes verifying a correlation signature based on information associated with at least one execution event in the execution event queue. In specific embodiments, the method includes evaluating an assignment statement of a script during compilation of the script by a compiler, detecting a compilation event based on at least a second criterion, and storing information associated with the compilation event in a compilation event queue. In yet additional embodiments, the verification of the correlation signature is based in part on information associated with one or more compilation events in the compilation event queue.
    Type: Grant
    Filed: January 16, 2014
    Date of Patent: November 27, 2018
    Assignee: McAfee, LLC.
    Inventors: Chong Xu, Bing Sun, Navtej Singh, Yichong Lin, Zheng Bu
  • Patent number: 10133863
    Abstract: A method for determining a zero-day attack by an electronic device is described. According to one embodiment, the method comprises instantiating, by the electronic device, at least one virtual machine, the at least one virtual machine being based on a fortified software profile. The method further comprises executing content capable of behaving as an exploit on the at least one virtual machine, and determining that the exploit is associated with zero-day exploit when the exploit, upon execution of the content on the at least one virtual machine, performs an undesired behavior.
    Type: Grant
    Filed: June 24, 2013
    Date of Patent: November 20, 2018
    Assignee: FireEye, Inc.
    Inventors: Zheng Bu, Yichong Lin
  • Patent number: 9594912
    Abstract: According to one embodiment, a threat detection system is integrated with at least a dynamic analysis engine. The dynamic analysis engine is configured to automatically detect a function call by an application, responsive to detecting the function call, analyze contents located at one or more addresses located within a portion of memory allocated for the application, and, based on the analysis, determine whether one or more objects included in received network traffic is associated with a return-oriented programming (ROP) exploit.
    Type: Grant
    Filed: June 20, 2014
    Date of Patent: March 14, 2017
    Assignee: FireEye, Inc.
    Inventors: Emmanuel Thioux, Yichong Lin
  • Publication number: 20150363598
    Abstract: A method is provided in one example embodiment and includes initiating an execution of a compiled script, evaluating a function called in the compiled script, detecting an execution event based on at least a first criterion, and storing information associated with the execution event in an execution event queue. The method also includes verifying a correlation signature based on information associated with at least one execution event in the execution event queue. In specific embodiments, the method includes evaluating an assignment statement of a script during compilation of the script by a compiler, detecting a compilation event based on at least a second criterion, and storing information associated with the compilation event in a compilation event queue. In yet additional embodiments, the verification of the correlation signature is based in part on information associated with one or more compilation events in the compilation event queue.
    Type: Application
    Filed: January 16, 2014
    Publication date: December 17, 2015
    Applicant: MCAFEE, INC.
    Inventors: Chong XU, Bing SUN, Navtej SINGH, Yichong LIN, Zheng BU
  • Publication number: 20140380473
    Abstract: A method for determining a zero-day attack by an electronic device is described. According to one embodiment, the method comprises instantiating, by the electronic device, at least one virtual machine, the at least one virtual machine being based on a fortified software profile. The method further comprises executing content capable of behaving as an exploit on the at least one virtual machine, and determining that the exploit is associated with zero-day exploit when the exploit, upon execution of the content on the at least one virtual machine, performs an undesired behavior.
    Type: Application
    Filed: June 24, 2013
    Publication date: December 25, 2014
    Inventors: Zheng Bu, Yichong Lin
  • Publication number: 20130074143
    Abstract: A method is provided in one example embodiment that includes receiving event information associated with reports from sensors distributed throughout a network environment and correlating the event information to identify a threat. A customized security policy based on the threat may be sent to the sensors.
    Type: Application
    Filed: September 15, 2011
    Publication date: March 21, 2013
    Inventors: Zheng Bu, Rahul Chander Kashyap, Yichong Lin, Denys Lok Hang Ma