Patents by Inventor Yichong Lin
Yichong Lin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250103723Abstract: The present invention discloses a computer implemented method and non-transitory computer-readable medium for assessing privacy compliance of online platforms. The method is executed by the processor to analyze the privacy policy text on an online platform, monitor the data traffic of the online platform, determine whether the online platform complies with privacy standards in collecting, transmitting, or managing privacy data, and provide a compliance result based on the determination. The compliance result at least includes whether the online platform collects unauthorized personal information from users, and whether it discloses contact information that satisfies the requirement of one or more privacy standards. This automated method significantly reduces the need for manual labor and resource allocation, as it can be implemented on a single computer.Type: ApplicationFiled: September 21, 2023Publication date: March 27, 2025Inventors: Zheng BU, Yichong LIN
-
Patent number: 10769001Abstract: Process states of computing devices may be obtained and processed. Process event information of a computing device may be obtained. The process event information may characterize states of processes of the computing device. The process event information may be stored within a queue. Graph information may be determined based on the process event information within the queue. The graph information may characterize states of processes of the computing device using nodes and edges. The graph information may be stored within a graph database.Type: GrantFiled: March 21, 2018Date of Patent: September 8, 2020Assignee: DiDi Research America, LLCInventors: Dong Li, Huaiyu Zhu, Jing Chen, Michael Lin, Shray Kapoor, Yichong Lin
-
Patent number: 10747591Abstract: Process states of computing devices may be collected for processing. Process event information of a first computing device may be determined based on an observation of process creation events and process termination events, a garbage collection, and a process scan. The process event information may be provided to a second computing device.Type: GrantFiled: March 21, 2018Date of Patent: August 18, 2020Assignee: DiDi Research America, LLCInventors: Dong Li, Huaiyu Zhu, Jing Chen, Michael Lin, Shray Kapoor, Yichong Lin
-
Publication number: 20190294482Abstract: Process states of computing devices may be obtained and processed. Process event information of a computing device may be obtained. The process event information may characterize states of processes of the computing device. The process event information may be stored within a queue. Graph information may be determined based on the process event information within the queue. The graph information may characterize states of processes of the computing device using nodes and edges. The graph information may be stored within a graph database.Type: ApplicationFiled: March 21, 2018Publication date: September 26, 2019Inventors: Dong LI, Huaiyu ZHU, Jing CHEN, Michael LIN, Shray KAPOOR, Yichong LIN
-
Publication number: 20190294481Abstract: Process states of computing devices may be collected for processing. Process event information of a first computing device may be determined based on an observation of process creation events and process termination events, a garbage collection, and a process scan. The process event information may be provided to a second computing device.Type: ApplicationFiled: March 21, 2018Publication date: September 26, 2019Inventors: Dong LI, Huaiyu ZHU, Jing CHEN, Michael LIN, Shray KAPOOR, Yichong LIN
-
Patent number: 10192052Abstract: According to one embodiment, a computerized method comprises conducting a first static scan on content within a file. Thereafter, if the first static scan did not result in the file being classified as malicious, the file is deconstructed to gain access to one or more objects within the file. A second static scan associated with the one or more objects is performed to determine whether the one or more objects are suspected of including malware. The file may then be classified as malicious based on results of the second static scan.Type: GrantFiled: September 30, 2013Date of Patent: January 29, 2019Assignee: FireEye, Inc.Inventors: Abhishek Singh, Yichong Lin, Angshuman Mukherjee, Zheng Bu
-
Patent number: 10140451Abstract: A method is provided in one example embodiment and includes initiating an execution of a compiled script, evaluating a function called in the compiled script, detecting an execution event based on at least a first criterion, and storing information associated with the execution event in an execution event queue. The method also includes verifying a correlation signature based on information associated with at least one execution event in the execution event queue. In specific embodiments, the method includes evaluating an assignment statement of a script during compilation of the script by a compiler, detecting a compilation event based on at least a second criterion, and storing information associated with the compilation event in a compilation event queue. In yet additional embodiments, the verification of the correlation signature is based in part on information associated with one or more compilation events in the compilation event queue.Type: GrantFiled: January 16, 2014Date of Patent: November 27, 2018Assignee: McAfee, LLC.Inventors: Chong Xu, Bing Sun, Navtej Singh, Yichong Lin, Zheng Bu
-
Patent number: 10133863Abstract: A method for determining a zero-day attack by an electronic device is described. According to one embodiment, the method comprises instantiating, by the electronic device, at least one virtual machine, the at least one virtual machine being based on a fortified software profile. The method further comprises executing content capable of behaving as an exploit on the at least one virtual machine, and determining that the exploit is associated with zero-day exploit when the exploit, upon execution of the content on the at least one virtual machine, performs an undesired behavior.Type: GrantFiled: June 24, 2013Date of Patent: November 20, 2018Assignee: FireEye, Inc.Inventors: Zheng Bu, Yichong Lin
-
Patent number: 9594912Abstract: According to one embodiment, a threat detection system is integrated with at least a dynamic analysis engine. The dynamic analysis engine is configured to automatically detect a function call by an application, responsive to detecting the function call, analyze contents located at one or more addresses located within a portion of memory allocated for the application, and, based on the analysis, determine whether one or more objects included in received network traffic is associated with a return-oriented programming (ROP) exploit.Type: GrantFiled: June 20, 2014Date of Patent: March 14, 2017Assignee: FireEye, Inc.Inventors: Emmanuel Thioux, Yichong Lin
-
Publication number: 20150363598Abstract: A method is provided in one example embodiment and includes initiating an execution of a compiled script, evaluating a function called in the compiled script, detecting an execution event based on at least a first criterion, and storing information associated with the execution event in an execution event queue. The method also includes verifying a correlation signature based on information associated with at least one execution event in the execution event queue. In specific embodiments, the method includes evaluating an assignment statement of a script during compilation of the script by a compiler, detecting a compilation event based on at least a second criterion, and storing information associated with the compilation event in a compilation event queue. In yet additional embodiments, the verification of the correlation signature is based in part on information associated with one or more compilation events in the compilation event queue.Type: ApplicationFiled: January 16, 2014Publication date: December 17, 2015Applicant: MCAFEE, INC.Inventors: Chong XU, Bing SUN, Navtej SINGH, Yichong LIN, Zheng BU
-
Publication number: 20140380473Abstract: A method for determining a zero-day attack by an electronic device is described. According to one embodiment, the method comprises instantiating, by the electronic device, at least one virtual machine, the at least one virtual machine being based on a fortified software profile. The method further comprises executing content capable of behaving as an exploit on the at least one virtual machine, and determining that the exploit is associated with zero-day exploit when the exploit, upon execution of the content on the at least one virtual machine, performs an undesired behavior.Type: ApplicationFiled: June 24, 2013Publication date: December 25, 2014Inventors: Zheng Bu, Yichong Lin
-
Publication number: 20130074143Abstract: A method is provided in one example embodiment that includes receiving event information associated with reports from sensors distributed throughout a network environment and correlating the event information to identify a threat. A customized security policy based on the threat may be sent to the sensors.Type: ApplicationFiled: September 15, 2011Publication date: March 21, 2013Inventors: Zheng Bu, Rahul Chander Kashyap, Yichong Lin, Denys Lok Hang Ma