Deledao
Chief Operating Officer
Trend Micro
Network Defense Strategiest
Trend Micro Feb 2014 - Mar 2019
General Manager of Network Security Unit
Trend Micro Oct 2011 - Jan 2014
Chief Architect
Netgear Dec 2008 - Jan 2010
Vice President of Engineering
Education:
Brown University 1992 - 1994
Master of Science, Masters, Computer Science
Nanjing University 1988 - 1992
Bachelors, Bachelor of Science, Computer Science
Skills:
Network Security Cloud Computing Networking Software Engineering Security Distributed Systems Enterprise Software Virtualization Software Architectural Design Computer Security Malware Analysis System Architecture Saas Software Development Go To Market Strategy Product Management
Brillient Store.Inc Fremont, CA Nov 2012 to Feb 2013 Data AnalystGlogou.Inc Santa Clara, CA Sep 2012 to Nov 2012 Web AnalystFXtrek.Inc Stamford, CT Jun 2011 to Oct 2011 AnalystEconomics Department
Jan 2010 to May 2010 Graduate Researcher, Binghamton University, NYEnovi Trade Co., Ltd
Aug 2008 to Jun 2009 Business Analyst
Education:
Binghamton University, State University of New York Binghamton, NY Aug 2009 to May 2011 Master of Arts in EconomicsBeijing Forestry University Aug 2005 to May 2009 Bachelor of Arts in International Economics and Trades
Skills:
SQL, SAS, STATA,phpmyadmin, Excel(pivot table, Vlookup), HTML CSS WordPress,
Shuang Ji - Santa Clara CA Renkui Tao - Nanjing, CN
Assignee:
Trend Micro Incorporated - Cupertino CA
International Classification:
G06F 1130
US Classification:
713201, 713200, 714 26, 714 38
Abstract:
Detecting viruses that may be transferred between a distributed computer network, such as the Internet, and a host computer. A host computer performs its own virus scanning on data, using executables code downloaded to its browser upon a request for data from the Internet, such as an HTTP request. Code is downloaded to the host computer, and is configured to create a virus scan module on the host computer upon such a request. The module is used to detect viruses in data transferred between the host computer and the Internet. Virus scanning is performed thereafter on the host computer. In cases where certain browsers may not be capable of supporting local virus scanning, code is first downloaded to determine whether local scanning is possible. If so, the virus scan module is then downloaded and executed.
Method And System For Low-Latency Detection Of Viruses Transmitted Over A Network
This invention relates generally to systems and methods for rapid, low-latency detection of viruses in network transmissions and specifically to methods for determining which parts of a network transmission might contain viruses and checking and cleaning only those parts of the transmission which could potentially be infected as soon as sufficient information is available for such a check.
A network scanner for security checking of application programs (e. g. Java applets or Active X controls) received over the Internet or an Intranet has both static (pre-run time) and dynamic (run time) scanning. Static scanning at the HTTP proxy server identifies suspicious instructions and instruments them e. g. a pre-and-post filter instruction sequence or otherwise. The instrumented applet is then transferred to the client (web browser) together with security monitoring code. During run time at the client, the instrumented instructions are thereby monitored for security policy violations, and execution of an instruction is prevented in the event of such a violation.
Virus Detection And Removal Apparatus For Computer Networks
Shuang Ji - Foster City CA Eva Chen - Cupertino CA
Assignee:
Trend Micro, Incorporated - Cupertino CA
International Classification:
G06F 1134
US Classification:
39518701
Abstract:
A system for detecting and eliminating viruses on a computer network includes a File Transfer Protocol (FTP) proxy server, for controlling the transfer of files and a Simple Mail Transfer Protocol (SMTP) proxy server for controlling the transfer of mail messages through the system. The FTP proxy server and SMTP proxy server run concurrently with the normal operation of the system and operate in a manner such that viruses transmitted to or from the network in files and messages are detected before transfer into or from the system. The FTP proxy server and SMTP proxy server scan all incoming and outgoing files and messages, respectively before transfer for viruses and then transfer the files and messages, only if they do not contain any viruses. A method for processing a file before transmission into or from the network includes the steps of: receiving the data transfer command and file name; transferring the file to a system node; performing virus detection on the file; determining whether the file contains any viruses; transferring the file from the system to a recipient node if the file does not contain a virus; and deleting the file if the file contains a virus.
Computer Network Malicious Code Scanner Method And Apparatus
A network scanner for security checking of application programs (e. g. Java applets or Active X controls) received over the Internet or an Intranet has both static (pre-run time) and dynamic (run time) scanning. Static scanning at the HTTP proxy server identifies suspicious instructions and instruments them e. g. a pre-and-post filter instruction sequence or otherwise. The instrumented applet is then transferred to the client (web browser) together with security monitoring code. During run time at the client, the instrumented instructions are thereby monitored for security policy violations, and execution of an instruction is prevented in the event of such a violation.
Apparatus And Method For Electronic Mail Virus Detection And Elimination
Shuang Ji - Foster City CA Eva Chen - Cupertino CA Yung-Chang Liang - Cupertino CA Warren Tsai - Taipei, TW
Assignee:
Trend Micro Incorporated
International Classification:
G06F 1300 G07D 700 H04L 900
US Classification:
39518701
Abstract:
The detection and elimination of viruses on a computer network is disclosed. An apparatus for detecting and eliminating viruses which may be introduced by messages sent through a postal node of a network electronic mail system includes polling and retrieval modules in communication with the postal node to determine the presence of unscanned messages and to download data associated with them to a node for treatment by a virus analysis and treatment module. A method for detecting and eliminating viruses introduced by an electronic mail system includes polling the postal node for unscanned messages, downloading the messages into a memory of a node, and performing virus detection and analysis at the node.
Name / Title
Company / Classification
Phones & Addresses
Shuang Ji President
CP SECURE INC
C/O Teng Accountancy Corporation, San Jose, CA 95129 360 Kiely Blvd, San Jose, CA 95129