Patents by Inventor Zhentan Feng

Zhentan Feng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10284577
    Abstract: The present application discloses a method and an apparatus for file identification. The method for file identification comprises: determining a virus family of each malicious file sample in a plurality of the file samples resulting in a plurality of virus families; dividing the plurality of the virus families into at least one sample group based on a number of the malicious files belonging to each of the plurality of virus families; training the malicious file samples in each of the at least one sample group with a different training rule to obtain at least one file identification model; and determining, using the at least one identification model whether a file is a malicious file. The method for file identification of the present application may provide different identification models for various types of malicious files and thus improves the accuracy of the file identification.
    Type: Grant
    Filed: December 31, 2015
    Date of Patent: May 7, 2019
    Assignee: IYUNTIAN CO., LTD.
    Inventors: Zhentan Feng, Deqiang Cao, Shuguang Xiong, Xiaobo Zhou, Xin Wang
  • Publication number: 20160366158
    Abstract: The present application discloses a method and an apparatus for file identification. The method for file identification comprises: determining a virus family of each malicious file sample in a plurality of the file samples resulting in a plurality of virus families; dividing the plurality of the virus families into at least one sample group based on a number of the malicious files belonging to each of the plurality of virus families; training the malicious file samples in each of the at least one sample group with a different training rule to obtain at least one file identification model; and determining, using the at least one identification model whether a file is a malicious file. The method for file identification of the present application may provide different identification models for various types of malicious files and thus improves the accuracy of the file identification.
    Type: Application
    Filed: December 31, 2015
    Publication date: December 15, 2016
    Inventors: Zhentan FENG, Deqiang CAO, Shuguang XIONG, Xiaobo ZHOU, Xin WANG
  • Patent number: 8560607
    Abstract: The present invention relates to a method based on the combination of UPnP and STUN for NAT traversal. The method of the present invention effectively takes the advantages of UPnP and STUN. In particularly, when UpnP fails to traverse NAT, STUN is applied to perform the NAT traversal for the second time, so that the efficiency of the successful traversal is effectively improved. For the symmetric NAT traversal, a Port-Adding Sample Estimation method based on NAT adding port mapping is provided for port estimation, to avoid the defects resulted from the third-party agent and the blindness of the speculation approach. And, where both of the communication peers in the P2P streaming media system are behind NAT, the method that the part of the ordinary outer peers with the sufficient bandwidth acts as the Auxiliary-Relay peers is provided to release the pressure of the relay server so that the bottle-neck of the communication is broken through.
    Type: Grant
    Filed: May 3, 2009
    Date of Patent: October 15, 2013
    Assignee: Institute of Acoustics, Chinese Academy of Science
    Inventors: Jinlin Wang, Hao Ren, Yifeng Lu, Shaowei Su, Zhentan Feng
  • Publication number: 20110264739
    Abstract: The present invention relates to a method based on the combination of UPnP and STUN for NAT traversal. The method of the present invention effectively takes the advantages of UPnP and STUN. In particularly, when UpnP fails to traverse NAT, STUN is applied to perform the NAT traversal for the second time, so that the efficiency of the successful traversal is effectively improved. For the symmetric NAT traversal, a Port-Adding Sample Estimation method based on NAT adding port mapping is provided for port estimation, to avoid the defects resulted from the third-party agent and the blindness of the speculation approach. And, where both of the communication peers in the P2P streaming media system are behind NAT, the method that the part of the ordinary outer peers with the sufficient bandwidth acts as the Auxiliary-Relay peers is provided to release the pressure of the relay server so that the bottle-neck of the communication is broken through.
    Type: Application
    Filed: May 3, 2009
    Publication date: October 27, 2011
    Applicant: Institute of Acoustics, Chinese Academy of Sciences
    Inventors: Jinlin Wang, Hao Ren, Yifeng Lu, Shaowei Su, Zhentan Feng