Patents by Inventor Zheng Bu

Zheng Bu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250103723
    Abstract: The present invention discloses a computer implemented method and non-transitory computer-readable medium for assessing privacy compliance of online platforms. The method is executed by the processor to analyze the privacy policy text on an online platform, monitor the data traffic of the online platform, determine whether the online platform complies with privacy standards in collecting, transmitting, or managing privacy data, and provide a compliance result based on the determination. The compliance result at least includes whether the online platform collects unauthorized personal information from users, and whether it discloses contact information that satisfies the requirement of one or more privacy standards. This automated method significantly reduces the need for manual labor and resource allocation, as it can be implemented on a single computer.
    Type: Application
    Filed: September 21, 2023
    Publication date: March 27, 2025
    Inventors: Zheng BU, Yichong LIN
  • Publication number: 20220129967
    Abstract: The present disclosure provides systems and methods for providing a transaction service when a service provider is providing a travel service to a service requester according to a travel service order through an online to offline service platform. The method may include receiving, through the online to offline service platform, a first request for the transaction service from a first terminal associated with the service requester, when a service provider is providing the travel service to the service requester. The method may include determining whether a condition for the transaction service is satisfied. In response to determining that the condition is satisfied, the method may also include generating a transaction service order for the transaction service. The method may further include providing the transaction service according to the transaction service order by using an account of the service provider.
    Type: Application
    Filed: October 28, 2020
    Publication date: April 28, 2022
    Inventors: Rongbo JIN, Zheng BU, Shanxiang QI
  • Patent number: 11089057
    Abstract: According to one embodiment, a threat detection system comprising an intrusion protection system (IPS) logic, a virtual execution logic and a reporting logic is shown. The IPS logic is configured to receive a first plurality of objects and analyze the first plurality of objects to identify a second plurality of objects as potential exploits, the second plurality of objects being a subset of the first plurality of objects and being lesser or equal in number to the first plurality of objects. The virtual execution logic including at least one virtual machine configured to process content within each of the second plurality of objects and monitor for anomalous behaviors during the processing that are indicative of exploits to classify that a first subset of the second plurality of objects includes one or more verified exploits. The reporting logic configured to provide a display of exploit information associated with the one or more verified exploits.
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: August 10, 2021
    Assignee: FireEye, Inc.
    Inventors: Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael, Zheng Bu
  • Patent number: 10637880
    Abstract: A method for detecting a cyber-attack by performing a first analysis on content within a first portion of a communication to determine whether the content includes a first high quality indicator. The first high quality indicator identifies a correlation of the content with a malicious activity. Subsequent to the first analysis, performing a second analysis on a second portion of the communication to determine one or more supplemental indicators. Thereafter, the communication is classified as part of a cyber-attack when (i) a value associated with the first high quality indicator exceeds a first threshold without consideration of the one or more supplemental indicators, or (ii) upon failing to exceed the first threshold and being greater than a second threshold, using the values representing the one or more supplemental indicators with the first value to classify the communication as being part of the cyber-attack.
    Type: Grant
    Filed: July 23, 2018
    Date of Patent: April 28, 2020
    Assignee: FireEye, Inc.
    Inventors: Ali Islam, Zheng Bu
  • Patent number: 10476909
    Abstract: According to one embodiment, a threat detection system comprising an intrusion protection system (IPS) logic, a virtual execution logic and a reporting logic is shown. The IPS logic is configured to receive a first plurality of objects and analyze the first plurality of objects to identify a second plurality of objects as potential exploits, the second plurality of objects being a subset of the first plurality of objects and being lesser or equal in number to the first plurality of objects. The virtual execution logic including at least one virtual machine configured to process content within each of the second plurality of objects and monitor for anomalous behaviors during the processing that are indicative of exploits to classify that a first subset of the second plurality of objects includes one or more verified exploits. The reporting logic configured to provide a display of exploit information associated with the one or more verified exploits.
    Type: Grant
    Filed: October 19, 2016
    Date of Patent: November 12, 2019
    Assignee: FireEye, Inc.
    Inventors: Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael, Zheng Bu
  • Patent number: 10467411
    Abstract: One embodiment of the disclosure is directed to a method for generating an identifier for use in malware detection. Herein, a first plurality of indicators of compromise are obtained. These indicators of compromise correspond to a plurality of anomalous behaviors. Thereafter, a filtering operation is performed on the first plurality of indicators of compromise by removing one or more indicators of compromise from the first plurality of indicators of compromise to create a second plurality of indicators of compromise. The identifier represented by the second plurality of indicators of compromise is created.
    Type: Grant
    Filed: August 28, 2017
    Date of Patent: November 5, 2019
    Assignee: FireEye, Inc.
    Inventors: Vinay K. Pidathala, Zheng Bu, Ashar Aziz
  • Patent number: 10432649
    Abstract: Techniques for detecting malicious behavior of content (object) are described herein. An object is processed within a virtual machine. Responsive to receiving the result of the processing (response object), a parser parses the response object into a plurality of sub-objects. The plurality of sub-objects include a first sub-object and a second sub-object. A first behavior match result is determined based, at least in part, on whether information within the first sub-object corresponds to a identifiers associated with malicious activity. Also, a second behavior match result is determined based, at least in part, on whether information within the second sub-object corresponds to identifiers associated with malicious activity. Thereafter, the first and second behavior match results are aggregated to produce an aggregated result, wherein a malicious behavior score is calculated based, at least in part, on the aggregated result. The object is classified according to the malicious behavior score.
    Type: Grant
    Filed: January 15, 2016
    Date of Patent: October 1, 2019
    Assignee: FireEye, Inc.
    Inventors: James Bennett, Zheng Bu
  • Patent number: 10192052
    Abstract: According to one embodiment, a computerized method comprises conducting a first static scan on content within a file. Thereafter, if the first static scan did not result in the file being classified as malicious, the file is deconstructed to gain access to one or more objects within the file. A second static scan associated with the one or more objects is performed to determine whether the one or more objects are suspected of including malware. The file may then be classified as malicious based on results of the second static scan.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: January 29, 2019
    Assignee: FireEye, Inc.
    Inventors: Abhishek Singh, Yichong Lin, Angshuman Mukherjee, Zheng Bu
  • Patent number: 10140451
    Abstract: A method is provided in one example embodiment and includes initiating an execution of a compiled script, evaluating a function called in the compiled script, detecting an execution event based on at least a first criterion, and storing information associated with the execution event in an execution event queue. The method also includes verifying a correlation signature based on information associated with at least one execution event in the execution event queue. In specific embodiments, the method includes evaluating an assignment statement of a script during compilation of the script by a compiler, detecting a compilation event based on at least a second criterion, and storing information associated with the compilation event in a compilation event queue. In yet additional embodiments, the verification of the correlation signature is based in part on information associated with one or more compilation events in the compilation event queue.
    Type: Grant
    Filed: January 16, 2014
    Date of Patent: November 27, 2018
    Assignee: McAfee, LLC.
    Inventors: Chong Xu, Bing Sun, Navtej Singh, Yichong Lin, Zheng Bu
  • Patent number: 10133863
    Abstract: A method for determining a zero-day attack by an electronic device is described. According to one embodiment, the method comprises instantiating, by the electronic device, at least one virtual machine, the at least one virtual machine being based on a fortified software profile. The method further comprises executing content capable of behaving as an exploit on the at least one virtual machine, and determining that the exploit is associated with zero-day exploit when the exploit, upon execution of the content on the at least one virtual machine, performs an undesired behavior.
    Type: Grant
    Filed: June 24, 2013
    Date of Patent: November 20, 2018
    Assignee: FireEye, Inc.
    Inventors: Zheng Bu, Yichong Lin
  • Patent number: 10033753
    Abstract: One embodiment of a method for detecting a cyber-attack features first and second analyzes. The first analysis is conducted on content of a communication to determine at least a first high quality indicator. The first high quality indicator represents a first probative value for classification. The second analysis is conducted on metadata related to the content to determine supplemental indicator(s). Each of the supplemental indicator(s) is represented by a probative value for classification. The communication is classified as being part of the cyber-attack when the first probative value exceeds a predetermined threshold without consideration of the corresponding probative values for the supplemental indicator(s).
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: July 24, 2018
    Assignee: FireEye, Inc.
    Inventors: Ali Islam, Zheng Bu
  • Patent number: 9990490
    Abstract: An apparatus, method, computer readable storage medium are provided in one or more examples and comprise accessing an application, identifying an access token of the application, determining if the access token is a system token, and responsive to the access token failing to be a system token, enabling a runtime module.
    Type: Grant
    Filed: November 13, 2015
    Date of Patent: June 5, 2018
    Assignee: McAfee, LLC
    Inventors: Bing Sun, Chong Xu, Jeff Hetzler, Zheng Bu
  • Patent number: 9756074
    Abstract: A threat detection system is integrated with intrusion protection system (IPS) logic and virtual execution logic is shown. The IPS logic is configured to receive a first plurality of objects and filter the first plurality of objects by identifying a second plurality of objects as suspicious objects. The second plurality of objects is a subset of the first plurality of objects and is lesser or equal in number to the first plurality of objects. The virtual execution logic is configured to automatically verify whether any of the suspicious objects is an exploit. The virtual execution logic comprises at least one virtual machine configured to virtually process content within the suspicious objects and monitor for anomalous behaviors during the virtual processing that are indicative of exploits.
    Type: Grant
    Filed: March 27, 2014
    Date of Patent: September 5, 2017
    Assignee: FireEye, Inc.
    Inventors: Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael, Zheng Bu
  • Patent number: 9747446
    Abstract: One embodiment of an electronic device comprises a processor and a memory accessible by the processor. The memory comprises virtual execution logic and run-time classifier logic. The virtual execution logic includes at least one virtual machine that is configured to virtually process content within an object under analysis and monitor for anomalous behaviors during the virtual processing that are indicative of malware. The run-time classifier logic performs, during run-time, a first analysis on the monitored anomalous behaviors and a pre-stored identifier to determine if the monitored anomalous behaviors indicate that the object is malware belonging to a classified malware family. The pre-stored identifier is a collection of data associated with anomalous behaviors that uniquely identify the malware family.
    Type: Grant
    Filed: March 27, 2014
    Date of Patent: August 29, 2017
    Assignee: FireEye, Inc.
    Inventors: Vinay K. Pidathala, Zheng Bu, Ashar Aziz
  • Patent number: 9635039
    Abstract: Techniques may automatically detect bots or botnets running in a computer or other digital device by detecting command and control communications, called “call-backs,” from malicious code that has previously gained entry into the digital device. Callbacks are detected using an approach employing both a set of high quality indicators and a set of supplemental indicators. The high quality indicators are selected since they provide a strong correlation with callbacks, and may be sufficient for the techniques to determine that the network outbound communications actually constitute callbacks. If not, the supplemental indicators may be used in conjunction with the high quality indicators to declare the outbound communications as callbacks.
    Type: Grant
    Filed: May 15, 2013
    Date of Patent: April 25, 2017
    Assignee: FireEye, Inc.
    Inventors: Ali Islam, Zheng Bu
  • Patent number: 9306974
    Abstract: A threat detection system is integrated with intrusion protection system (IPS) logic, virtual execution logic and reporting logic is shown. The IPS logic is configured to identify a first plurality of objects as suspicious objects and outputting information associated with the suspicious objects. The virtual execution logic is configured to receive the suspicious objects and verify whether any of the suspicious objects is an exploit. The virtual execution logic includes at least one virtual machine configured to virtually process content within the suspicious objects and monitor for anomalous behaviors during the virtual processing that are indicative of exploits. The reporting logic is configured to issue a report including the information associated with the suspicious objects from the IPS logic and results of the virtual processing of the content within the suspicious objects.
    Type: Grant
    Filed: February 11, 2015
    Date of Patent: April 5, 2016
    Assignee: FireEye, Inc.
    Inventors: Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael, Zheng Bu
  • Publication number: 20160070906
    Abstract: An apparatus, method, computer readable storage medium are provided in one or more examples and comprise accessing an application, identifying an access token of the application, determining if the access token is a system token, and responsive to the access token failing to be a system token, enabling a runtime module.
    Type: Application
    Filed: November 13, 2015
    Publication date: March 10, 2016
    Inventors: Bing Sun, Chong Xu, Jeff Hetzler, Zheng Bu
  • Patent number: 9251343
    Abstract: Techniques detect bootkits resident on a computer by detecting a change or attempted change to contents of boot locations (e.g., the master boot record) of persistent storage, which may evidence a resident bootkit. Some embodiments may monitor computer operations seeking to change the content of boot locations of persistent storage, where the monitored operations may include API calls performing, for example, WRITE, READ or APPEND operations with respect to the contents of the boot locations. Other embodiments may generate a baseline hash of the contents of the boot locations at a first point of time and a hash snapshot of the boot locations at a second point of time, and compare the baseline hash and hash snapshot where any difference between the two hash values constitutes evidence of a resident bootkit.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: February 2, 2016
    Assignee: FireEye, Inc.
    Inventors: Michael M. Vincent, Abhishek Singh, Muhammad Amin, Zheng Bu
  • Patent number: 9241010
    Abstract: Techniques for detecting malicious behavior of content or objects are described herein. According to one embodiment, a malicious content suspect is executed within a virtual machine that simulates a target operating environment associated with the malicious content suspect. A communication response object is received as a result of processing the malicious content suspect. A first behavior match result for a first sub-object of the communication response object is determined. A second behavior match result for a second sub-object of the communication response object is also determined. The first and second behavior match results are aggregated and a malicious behavior score is calculated according to the aggregated result from all matches. The malicious content suspect is classified according to the malicious behavior score.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: January 19, 2016
    Assignee: FireEye, Inc.
    Inventors: James Bennett, Zheng Bu
  • Publication number: 20150363598
    Abstract: A method is provided in one example embodiment and includes initiating an execution of a compiled script, evaluating a function called in the compiled script, detecting an execution event based on at least a first criterion, and storing information associated with the execution event in an execution event queue. The method also includes verifying a correlation signature based on information associated with at least one execution event in the execution event queue. In specific embodiments, the method includes evaluating an assignment statement of a script during compilation of the script by a compiler, detecting a compilation event based on at least a second criterion, and storing information associated with the compilation event in a compilation event queue. In yet additional embodiments, the verification of the correlation signature is based in part on information associated with one or more compilation events in the compilation event queue.
    Type: Application
    Filed: January 16, 2014
    Publication date: December 17, 2015
    Applicant: MCAFEE, INC.
    Inventors: Chong XU, Bing SUN, Navtej SINGH, Yichong LIN, Zheng BU