Patents by Inventor Yuen-Pin Yeap
Yuen-Pin Yeap has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220358216Abstract: A computer implemented cyber security method for preventing and removing undesired modifications of a protected file may include: generating a virtual file object via an authorized handler associated with the protected file, and when a write request to the protected file is received, the write request is redirected to the virtual file object causing the write request to store the change to the data of the protected file as data in the virtual file object; receiving a read request of the protected file; determining if there is data on the virtual file object associated with the protected file; and determining if the data on the virtual file object comprises a change to the data of the protected file; and, based on the determination, the authorized handler returns one of: (i) the data of the protected file changed by the write request and (ii) the data of the protected file unchanged by the write request.Type: ApplicationFiled: July 25, 2022Publication date: November 10, 2022Applicant: NeuShield, Inc.Inventors: Fei Qi, Yuen Pin Yeap
-
Patent number: 11423165Abstract: In some embodiments, a cyber security method for preventing unauthorized file modification by malicious software and the like, the file accessible to an authorized handler may include: receiving a first access request from a program, the first access request having a first instruction set for modifying data of the file; determining if the file is associated with the authorized handler; processing the first instruction set to produce first modification data; and generating an initial virtual file object comprising the first modification data. In further embodiments, a cyber security method for preventing unauthorized file modification by malicious software and the like, the file accessible to an authorized handler may include: processing an instruction set for modifying a file to produce modification data; generating a virtual file object comprising the modification data; and associating the virtual file object with the file by identifying the file as a sparse file.Type: GrantFiled: July 22, 2020Date of Patent: August 23, 2022Assignee: NeuShield, Inc.Inventors: Fei Qi, Yuen Pin Yeap
-
Patent number: 11307950Abstract: A data health monitoring system and method are provided which may be configured to monitor different indicators or parameters of a computing device which may affect the health of the computing device, such as which may be used in looking for early warning signs that could indicate future data loss or corruption. The system may periodically query certain data health indicators, such as S.M.A.R.T. status, disk temperature, read and write errors, etc. The system may also monitor data as it is being accessed keeping track of other indicators such as: files that are modified, when the last backed up was, protection status of the file, type of changes made to the file, which application is making changes, etc. Preferably, the combined status of each data health indicator may be rolled up into a simple message and shown to the user via notifications, reports, logs or a user interface.Type: GrantFiled: March 28, 2021Date of Patent: April 19, 2022Assignee: NeuShield, Inc.Inventors: Elisha Riedlinger, Fei Qi, Yuen Pin Yeap
-
Publication number: 20210216424Abstract: A data health monitoring system and method are provided which may be configured to monitor different indicators or parameters of a computing device which may affect the health of the computing device, such as which may be used in looking for early warning signs that could indicate future data loss or corruption. The system may periodically query certain data health indicators, such as S.M.A.R.T. status, disk temperature, read and write errors, etc. The system may also monitor data as it is being accessed keeping track of other indicators such as: files that are modified, when the last backed up was, protection status of the file, type of changes made to the file, which application is making changes, etc. Preferably, the combined status of each data health indicator may be rolled up into a simple message and shown to the user via notifications, reports, logs or a user interface.Type: ApplicationFiled: March 28, 2021Publication date: July 15, 2021Applicant: NeuShield, Inc.Inventors: Elisha Riedlinger, Fei Qi, Yuen Pin Yeap
-
Patent number: 10999324Abstract: A method, system and computer-usable medium are disclosed for enforcing a security policy, comprising: determining when an endpoint device initiates a web transaction with a web server, the endpoint device initiating the web transaction with a web-enabled application; establishing a side channel to a security service when the endpoint device initiates the web transaction with the web-enabled application; performing a categorization and policy enforcement operation via the security service in parallel with initiating the web transaction, the categorization and policy enforcement operation determining a security policy result regarding the web transaction; withholding content resulting from performance of the web transaction until the security policy result is provided by the security service, the content being withheld at the endpoint device; and, releasing the content resulting from the web transaction to the web-enabled application of the endpoint device upon receipt of an affirmative policy result from theType: GrantFiled: August 1, 2017Date of Patent: May 4, 2021Assignee: Forcepoint, LLCInventors: Roman Kleiner, Yuen-Pin Yeap, Jason Wieland
-
Patent number: 10983893Abstract: A data health monitoring system and method are provided which may be configured to monitor different indicators of a computing device which may affect the health of data, looking for early warning signs that could indicate future data loss or corruption. The system may periodically query certain data health indicators, such as S.M.A.R.T. status, disk temperature, read and write errors, etc. The system may also monitor data as it is being accessed keeping track of other indicators such as: files that are modified, when the last backed up was, protection status of the file, type of changes made to the file, which application is making changes, etc. Preferably, the combined status of each data health indicator may be rolled up into a simple message and shown to the user via notifications, reports, logs or a user interface.Type: GrantFiled: February 8, 2019Date of Patent: April 20, 2021Assignee: NEUSHIELD, INC.Inventors: Elisha Riedlinger, Fei Qi, Yuen Pin Yeap
-
Publication number: 20200349269Abstract: In some embodiments, a cyber security method for preventing unauthorized file modification by malicious software and the like, the file accessible to an authorized handler may include: receiving a first access request from a program, the first access request having a first instruction set for modifying data of the file; determining if the file is associated with the authorized handler; processing the first instruction set to produce first modification data; and generating an initial virtual file object comprising the first modification data. In further embodiments, a cyber security method for preventing unauthorized file modification by malicious software and the like, the file accessible to an authorized handler may include: processing an instruction set for modifying a file to produce modification data; generating a virtual file object comprising the modification data; and associating the virtual file object with the file by identifying the file as a sparse file.Type: ApplicationFiled: July 22, 2020Publication date: November 5, 2020Applicant: NeuShield, Inc.Inventors: Fei Qi, Yuen Pin Yeap
-
Publication number: 20190044914Abstract: A method, system and computer-usable medium are disclosed for enforcing a security policy, comprising: determining when an endpoint device initiates a web transaction with a web server; establishing a side channel to a security service when the endpoint device initiates the web transaction with a web-enabled application; performing a categorization and policy enforcement operation via the security service in parallel with initiating the web transaction, the categorization and policy enforcement operation determining a security policy result regarding the web transaction; withholding content resulting from performance of the web transaction at the endpoint device until the security policy result is provided by the security service; and, releasing the content resulting from the web transaction to the web-enabled application of the endpoint device upon receipt of an affirmative policy result from the security service.Type: ApplicationFiled: August 1, 2017Publication date: February 7, 2019Inventors: Roman Kleiner, Yuen-Pin Yeap, Jason Wieland
-
Patent number: 8001223Abstract: A method and apparatus to reconfigure parameters for establishing a link with a new host after a computer is moved to a new location or a new network.Type: GrantFiled: August 14, 2009Date of Patent: August 16, 2011Assignee: Symantec CorporationInventors: Yuen-Pin Yeap, Yadong Zhang
-
Patent number: 7707558Abstract: Systems and methods for computer security are provided. In one implementation, a computer-implemented method is provided. The method includes applying a hook to a kernel of an operating system, monitoring system calls made to the kernel using the hook, and injecting a new entry into a list of files assembled by a loader to create a new process when the hook identifies a create process system call. In another implementation, the method can further include initializing the injected new entry where the injected new entry is operable to examine process files prior to loading, examining the process files, and acting on the process according to a result of the examination.Type: GrantFiled: June 10, 2005Date of Patent: April 27, 2010Assignee: Symantec CorporationInventors: Yuen-Pin Yeap, Paul Daniel Lawrence
-
Publication number: 20090313359Abstract: A method and apparatus to reconfigure parameters for establishing a link with a new host after a computer is moved to a new location or a new network.Type: ApplicationFiled: August 14, 2009Publication date: December 17, 2009Inventors: Yuen-Pin Yeap, Yadong Zhang
-
Patent number: 7587724Abstract: Systems and method of computer security are provided. In one implementation, a method is provided. The method includes monitoring incoming kernel mode calls and identifying a kernel mode call to verify using a predetermined criterion. The method also includes validating the identified kernel mode call, and processing the kernel mode call in accordance with the results of the validation of the kernel mode call. In another implementation a kernel application programming interface validation device is provided. The kernel application programming interface validation device includes a monitoring engine for monitoring incoming kernel mode calls, an analysis engine operable to examiner kernel mode calls, a validation engine operable to determine if a kernel mode call is valid using the results of the analysis engine, and a processing engine.Type: GrantFiled: July 13, 2005Date of Patent: September 8, 2009Assignee: Symantec CorporationInventor: Yuen-Pin Yeap
-
Publication number: 20070016914Abstract: Systems and method of computer security are provided. In one implementation, a method is provided. The method includes monitoring incoming kernel mode calls and identifying a kernel mode call to verify using a predetermined criterion. The method also includes validating the identified kernel mode call, and processing the kernel mode call in accordance with the results of the validation of the kernel mode call. In another implementation a kernel application programming interface validation device is provided. The kernel application programming interface validation device includes a monitoring engine for monitoring incoming kernel mode calls, an analysis engine operable to examiner kernel mode calls, a validation engine operable to determine if a kernel mode call is valid using the results of the analysis engine, and a processing engine.Type: ApplicationFiled: July 13, 2005Publication date: January 18, 2007Inventor: Yuen-Pin Yeap
-
Publication number: 20060282827Abstract: Systems and methods for computer security are provided. In one implementation, a computer-implemented method is provided. The method includes applying a hook to a kernel of an operating system, monitoring system calls made to the kernel using the hook, and injecting a new entry into a list of files assembled by a loader to create a new process when the hook identifies a create process system call.Type: ApplicationFiled: June 10, 2005Publication date: December 14, 2006Inventors: Yuen-Pin Yeap, Paul Lawrence
-
Publication number: 20060069760Abstract: Methods and apparatus to reconfigure parameters for establishing a link with a new host after a computer is moved to a new location or a new network. A computer-implemented method for networking includes steps of examining an established link for a need to establish a new link, establishing the new link by selecting a network profile from a plurality of network profiles stored in a profile database, and reconfiguring parameters for a current network setting automatically without user input. The network profile contains a plurality of configuration parameters for establishing links.Type: ApplicationFiled: October 27, 2005Publication date: March 30, 2006Inventors: Yuen-Pin Yeap, Yadong Zhang
-
Patent number: 6961762Abstract: A method and apparatus to reconfigure parameters for establishing a link with a new host after a computer is moved to a new location or a new network.Type: GrantFiled: May 10, 2000Date of Patent: November 1, 2005Assignee: Sygate Technologies, Inc.Inventors: Yuen-Pin Yeap, Yadong Zhang