Patents by Inventor Zheng Bu
Zheng Bu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250103723Abstract: The present invention discloses a computer implemented method and non-transitory computer-readable medium for assessing privacy compliance of online platforms. The method is executed by the processor to analyze the privacy policy text on an online platform, monitor the data traffic of the online platform, determine whether the online platform complies with privacy standards in collecting, transmitting, or managing privacy data, and provide a compliance result based on the determination. The compliance result at least includes whether the online platform collects unauthorized personal information from users, and whether it discloses contact information that satisfies the requirement of one or more privacy standards. This automated method significantly reduces the need for manual labor and resource allocation, as it can be implemented on a single computer.Type: ApplicationFiled: September 21, 2023Publication date: March 27, 2025Inventors: Zheng BU, Yichong LIN
-
Publication number: 20220129967Abstract: The present disclosure provides systems and methods for providing a transaction service when a service provider is providing a travel service to a service requester according to a travel service order through an online to offline service platform. The method may include receiving, through the online to offline service platform, a first request for the transaction service from a first terminal associated with the service requester, when a service provider is providing the travel service to the service requester. The method may include determining whether a condition for the transaction service is satisfied. In response to determining that the condition is satisfied, the method may also include generating a transaction service order for the transaction service. The method may further include providing the transaction service according to the transaction service order by using an account of the service provider.Type: ApplicationFiled: October 28, 2020Publication date: April 28, 2022Inventors: Rongbo JIN, Zheng BU, Shanxiang QI
-
Patent number: 11089057Abstract: According to one embodiment, a threat detection system comprising an intrusion protection system (IPS) logic, a virtual execution logic and a reporting logic is shown. The IPS logic is configured to receive a first plurality of objects and analyze the first plurality of objects to identify a second plurality of objects as potential exploits, the second plurality of objects being a subset of the first plurality of objects and being lesser or equal in number to the first plurality of objects. The virtual execution logic including at least one virtual machine configured to process content within each of the second plurality of objects and monitor for anomalous behaviors during the processing that are indicative of exploits to classify that a first subset of the second plurality of objects includes one or more verified exploits. The reporting logic configured to provide a display of exploit information associated with the one or more verified exploits.Type: GrantFiled: November 8, 2019Date of Patent: August 10, 2021Assignee: FireEye, Inc.Inventors: Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael, Zheng Bu
-
Patent number: 10637880Abstract: A method for detecting a cyber-attack by performing a first analysis on content within a first portion of a communication to determine whether the content includes a first high quality indicator. The first high quality indicator identifies a correlation of the content with a malicious activity. Subsequent to the first analysis, performing a second analysis on a second portion of the communication to determine one or more supplemental indicators. Thereafter, the communication is classified as part of a cyber-attack when (i) a value associated with the first high quality indicator exceeds a first threshold without consideration of the one or more supplemental indicators, or (ii) upon failing to exceed the first threshold and being greater than a second threshold, using the values representing the one or more supplemental indicators with the first value to classify the communication as being part of the cyber-attack.Type: GrantFiled: July 23, 2018Date of Patent: April 28, 2020Assignee: FireEye, Inc.Inventors: Ali Islam, Zheng Bu
-
Patent number: 10476909Abstract: According to one embodiment, a threat detection system comprising an intrusion protection system (IPS) logic, a virtual execution logic and a reporting logic is shown. The IPS logic is configured to receive a first plurality of objects and analyze the first plurality of objects to identify a second plurality of objects as potential exploits, the second plurality of objects being a subset of the first plurality of objects and being lesser or equal in number to the first plurality of objects. The virtual execution logic including at least one virtual machine configured to process content within each of the second plurality of objects and monitor for anomalous behaviors during the processing that are indicative of exploits to classify that a first subset of the second plurality of objects includes one or more verified exploits. The reporting logic configured to provide a display of exploit information associated with the one or more verified exploits.Type: GrantFiled: October 19, 2016Date of Patent: November 12, 2019Assignee: FireEye, Inc.Inventors: Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael, Zheng Bu
-
Patent number: 10467411Abstract: One embodiment of the disclosure is directed to a method for generating an identifier for use in malware detection. Herein, a first plurality of indicators of compromise are obtained. These indicators of compromise correspond to a plurality of anomalous behaviors. Thereafter, a filtering operation is performed on the first plurality of indicators of compromise by removing one or more indicators of compromise from the first plurality of indicators of compromise to create a second plurality of indicators of compromise. The identifier represented by the second plurality of indicators of compromise is created.Type: GrantFiled: August 28, 2017Date of Patent: November 5, 2019Assignee: FireEye, Inc.Inventors: Vinay K. Pidathala, Zheng Bu, Ashar Aziz
-
Patent number: 10432649Abstract: Techniques for detecting malicious behavior of content (object) are described herein. An object is processed within a virtual machine. Responsive to receiving the result of the processing (response object), a parser parses the response object into a plurality of sub-objects. The plurality of sub-objects include a first sub-object and a second sub-object. A first behavior match result is determined based, at least in part, on whether information within the first sub-object corresponds to a identifiers associated with malicious activity. Also, a second behavior match result is determined based, at least in part, on whether information within the second sub-object corresponds to identifiers associated with malicious activity. Thereafter, the first and second behavior match results are aggregated to produce an aggregated result, wherein a malicious behavior score is calculated based, at least in part, on the aggregated result. The object is classified according to the malicious behavior score.Type: GrantFiled: January 15, 2016Date of Patent: October 1, 2019Assignee: FireEye, Inc.Inventors: James Bennett, Zheng Bu
-
Patent number: 10192052Abstract: According to one embodiment, a computerized method comprises conducting a first static scan on content within a file. Thereafter, if the first static scan did not result in the file being classified as malicious, the file is deconstructed to gain access to one or more objects within the file. A second static scan associated with the one or more objects is performed to determine whether the one or more objects are suspected of including malware. The file may then be classified as malicious based on results of the second static scan.Type: GrantFiled: September 30, 2013Date of Patent: January 29, 2019Assignee: FireEye, Inc.Inventors: Abhishek Singh, Yichong Lin, Angshuman Mukherjee, Zheng Bu
-
Patent number: 10140451Abstract: A method is provided in one example embodiment and includes initiating an execution of a compiled script, evaluating a function called in the compiled script, detecting an execution event based on at least a first criterion, and storing information associated with the execution event in an execution event queue. The method also includes verifying a correlation signature based on information associated with at least one execution event in the execution event queue. In specific embodiments, the method includes evaluating an assignment statement of a script during compilation of the script by a compiler, detecting a compilation event based on at least a second criterion, and storing information associated with the compilation event in a compilation event queue. In yet additional embodiments, the verification of the correlation signature is based in part on information associated with one or more compilation events in the compilation event queue.Type: GrantFiled: January 16, 2014Date of Patent: November 27, 2018Assignee: McAfee, LLC.Inventors: Chong Xu, Bing Sun, Navtej Singh, Yichong Lin, Zheng Bu
-
Patent number: 10133863Abstract: A method for determining a zero-day attack by an electronic device is described. According to one embodiment, the method comprises instantiating, by the electronic device, at least one virtual machine, the at least one virtual machine being based on a fortified software profile. The method further comprises executing content capable of behaving as an exploit on the at least one virtual machine, and determining that the exploit is associated with zero-day exploit when the exploit, upon execution of the content on the at least one virtual machine, performs an undesired behavior.Type: GrantFiled: June 24, 2013Date of Patent: November 20, 2018Assignee: FireEye, Inc.Inventors: Zheng Bu, Yichong Lin
-
Patent number: 10033753Abstract: One embodiment of a method for detecting a cyber-attack features first and second analyzes. The first analysis is conducted on content of a communication to determine at least a first high quality indicator. The first high quality indicator represents a first probative value for classification. The second analysis is conducted on metadata related to the content to determine supplemental indicator(s). Each of the supplemental indicator(s) is represented by a probative value for classification. The communication is classified as being part of the cyber-attack when the first probative value exceeds a predetermined threshold without consideration of the corresponding probative values for the supplemental indicator(s).Type: GrantFiled: April 24, 2017Date of Patent: July 24, 2018Assignee: FireEye, Inc.Inventors: Ali Islam, Zheng Bu
-
Patent number: 9990490Abstract: An apparatus, method, computer readable storage medium are provided in one or more examples and comprise accessing an application, identifying an access token of the application, determining if the access token is a system token, and responsive to the access token failing to be a system token, enabling a runtime module.Type: GrantFiled: November 13, 2015Date of Patent: June 5, 2018Assignee: McAfee, LLCInventors: Bing Sun, Chong Xu, Jeff Hetzler, Zheng Bu
-
Patent number: 9756074Abstract: A threat detection system is integrated with intrusion protection system (IPS) logic and virtual execution logic is shown. The IPS logic is configured to receive a first plurality of objects and filter the first plurality of objects by identifying a second plurality of objects as suspicious objects. The second plurality of objects is a subset of the first plurality of objects and is lesser or equal in number to the first plurality of objects. The virtual execution logic is configured to automatically verify whether any of the suspicious objects is an exploit. The virtual execution logic comprises at least one virtual machine configured to virtually process content within the suspicious objects and monitor for anomalous behaviors during the virtual processing that are indicative of exploits.Type: GrantFiled: March 27, 2014Date of Patent: September 5, 2017Assignee: FireEye, Inc.Inventors: Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael, Zheng Bu
-
Patent number: 9747446Abstract: One embodiment of an electronic device comprises a processor and a memory accessible by the processor. The memory comprises virtual execution logic and run-time classifier logic. The virtual execution logic includes at least one virtual machine that is configured to virtually process content within an object under analysis and monitor for anomalous behaviors during the virtual processing that are indicative of malware. The run-time classifier logic performs, during run-time, a first analysis on the monitored anomalous behaviors and a pre-stored identifier to determine if the monitored anomalous behaviors indicate that the object is malware belonging to a classified malware family. The pre-stored identifier is a collection of data associated with anomalous behaviors that uniquely identify the malware family.Type: GrantFiled: March 27, 2014Date of Patent: August 29, 2017Assignee: FireEye, Inc.Inventors: Vinay K. Pidathala, Zheng Bu, Ashar Aziz
-
Patent number: 9635039Abstract: Techniques may automatically detect bots or botnets running in a computer or other digital device by detecting command and control communications, called “call-backs,” from malicious code that has previously gained entry into the digital device. Callbacks are detected using an approach employing both a set of high quality indicators and a set of supplemental indicators. The high quality indicators are selected since they provide a strong correlation with callbacks, and may be sufficient for the techniques to determine that the network outbound communications actually constitute callbacks. If not, the supplemental indicators may be used in conjunction with the high quality indicators to declare the outbound communications as callbacks.Type: GrantFiled: May 15, 2013Date of Patent: April 25, 2017Assignee: FireEye, Inc.Inventors: Ali Islam, Zheng Bu
-
Patent number: 9306974Abstract: A threat detection system is integrated with intrusion protection system (IPS) logic, virtual execution logic and reporting logic is shown. The IPS logic is configured to identify a first plurality of objects as suspicious objects and outputting information associated with the suspicious objects. The virtual execution logic is configured to receive the suspicious objects and verify whether any of the suspicious objects is an exploit. The virtual execution logic includes at least one virtual machine configured to virtually process content within the suspicious objects and monitor for anomalous behaviors during the virtual processing that are indicative of exploits. The reporting logic is configured to issue a report including the information associated with the suspicious objects from the IPS logic and results of the virtual processing of the content within the suspicious objects.Type: GrantFiled: February 11, 2015Date of Patent: April 5, 2016Assignee: FireEye, Inc.Inventors: Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael, Zheng Bu
-
Publication number: 20160070906Abstract: An apparatus, method, computer readable storage medium are provided in one or more examples and comprise accessing an application, identifying an access token of the application, determining if the access token is a system token, and responsive to the access token failing to be a system token, enabling a runtime module.Type: ApplicationFiled: November 13, 2015Publication date: March 10, 2016Inventors: Bing Sun, Chong Xu, Jeff Hetzler, Zheng Bu
-
Patent number: 9251343Abstract: Techniques detect bootkits resident on a computer by detecting a change or attempted change to contents of boot locations (e.g., the master boot record) of persistent storage, which may evidence a resident bootkit. Some embodiments may monitor computer operations seeking to change the content of boot locations of persistent storage, where the monitored operations may include API calls performing, for example, WRITE, READ or APPEND operations with respect to the contents of the boot locations. Other embodiments may generate a baseline hash of the contents of the boot locations at a first point of time and a hash snapshot of the boot locations at a second point of time, and compare the baseline hash and hash snapshot where any difference between the two hash values constitutes evidence of a resident bootkit.Type: GrantFiled: March 15, 2013Date of Patent: February 2, 2016Assignee: FireEye, Inc.Inventors: Michael M. Vincent, Abhishek Singh, Muhammad Amin, Zheng Bu
-
Patent number: 9241010Abstract: Techniques for detecting malicious behavior of content or objects are described herein. According to one embodiment, a malicious content suspect is executed within a virtual machine that simulates a target operating environment associated with the malicious content suspect. A communication response object is received as a result of processing the malicious content suspect. A first behavior match result for a first sub-object of the communication response object is determined. A second behavior match result for a second sub-object of the communication response object is also determined. The first and second behavior match results are aggregated and a malicious behavior score is calculated according to the aggregated result from all matches. The malicious content suspect is classified according to the malicious behavior score.Type: GrantFiled: March 20, 2014Date of Patent: January 19, 2016Assignee: FireEye, Inc.Inventors: James Bennett, Zheng Bu
-
Publication number: 20150363598Abstract: A method is provided in one example embodiment and includes initiating an execution of a compiled script, evaluating a function called in the compiled script, detecting an execution event based on at least a first criterion, and storing information associated with the execution event in an execution event queue. The method also includes verifying a correlation signature based on information associated with at least one execution event in the execution event queue. In specific embodiments, the method includes evaluating an assignment statement of a script during compilation of the script by a compiler, detecting a compilation event based on at least a second criterion, and storing information associated with the compilation event in a compilation event queue. In yet additional embodiments, the verification of the correlation signature is based in part on information associated with one or more compilation events in the compilation event queue.Type: ApplicationFiled: January 16, 2014Publication date: December 17, 2015Applicant: MCAFEE, INC.Inventors: Chong XU, Bing SUN, Navtej SINGH, Yichong LIN, Zheng BU