Search

Jianpeng Mo Phones & Addresses

  • 925 Linden Ave, Burlingame, CA 94010
  • San Leandro, CA
  • San Jose, CA
  • Brooklyn, NY

Work

Company: Opswat Dec 2012 Position: Software analyst manager

Education

Degree: Master School / High School: New York University 2008 to 2009 Specialities: Electrical Engineering

Skills

Team Management • Software Development • Agile Project Management • Project Planning • Encryption • Continuous Delivery • Kernel Drivers • International Development • Department Budgeting • Technology Integration • Perl • Mysql • Linux • Sql • C++ • Php • Javascript • Java • Netbeans • C# • Web Design • Html 5 • Python • Jira • Html • Html5 • Software Engineering • Software Project Management • Budget Management

Languages

English • Mandarin

Interests

New Technology • Moives • Optics • Sport • Books

Industries

Information Technology And Services

Resumes

Resumes

Jianpeng Mo Photo 1

Group Technical Program Manager, Security

View page
Location:
Burlingame, CA
Industry:
Information Technology And Services
Work:
OPSWAT since Dec 2012
Software Analyst Manager

OPSWAT - San Francisco Bay Area Jul 2011 - Dec 2012
Software Analyst Lead

GetJar Inc. - San Mateo, CA May 2011 - Jul 2011
Quality Engineer

OPSWAT - San Francisco Bay Area Sep 2010 - May 2011
Quality Assurance

Videofashion News Sep 2009 - Jul 2010
Website and Software Developer
Education:
New York University 2008 - 2009
Master, Electrical Engineering
South China University of Technology 2007 - 2009
Master, Optical Information
South China University of Technology 2003 - 2007
Bachelor, Finance
Skills:
Team Management
Software Development
Agile Project Management
Project Planning
Encryption
Continuous Delivery
Kernel Drivers
International Development
Department Budgeting
Technology Integration
Perl
Mysql
Linux
Sql
C++
Php
Javascript
Java
Netbeans
C#
Web Design
Html 5
Python
Jira
Html
Html5
Software Engineering
Software Project Management
Budget Management
Interests:
New Technology
Moives
Optics
Sport
Books
Languages:
English
Mandarin

Publications

Us Patents

File Security Using File Format Validation

View page
US Patent:
20200104494, Apr 2, 2020
Filed:
Feb 14, 2019
Appl. No.:
16/275694
Inventors:
- San Francisco CA, US
Yiyi Miao - San Mateo CA, US
Jianpeng Mo - Burlingame CA, US
Assignee:
OPSWAT, Inc. - San Francisco CA
International Classification:
G06F 21/56
G06F 16/11
Abstract:
A method for securely validating the file format type including receiving a file having a file format type, a header and a content block. The header has a header block with a description representing attributes of the actual content in the file. The content block has leading bytes representing attributes of the actual content, and actual content. Data is parsed from the description of the header block, the leading bytes and the actual content. Data from the description is compared to the data from the leading bytes, data from the leading bytes is compared to the data from the actual content, and data from the description is compared to the data from the actual content. The file format type is validated and trustable when the data from the description, the data from the leading bytes and the data from the actual content are consistent with one another.

Computer Security Vulnerability Assessment

View page
US Patent:
20190075129, Mar 7, 2019
Filed:
Oct 29, 2018
Appl. No.:
16/174139
Inventors:
- San Francisco CA, US
Jianpeng Mo - Burlingame CA, US
Ali Rezafard - Millbrae CA, US
David Matthew Patt - Kansas City MO, US
Assignee:
OPSWAT, Inc. - San Francisco CA
International Classification:
H04L 29/06
G06F 17/30
G06F 21/57
Abstract:
Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.

Network Access Control With Compliance Policy Check

View page
US Patent:
20180352003, Dec 6, 2018
Filed:
Aug 9, 2018
Appl. No.:
16/059467
Inventors:
- San Francisco CA, US
Benjamin Czarny - San Francisco CA, US
Jianpeng Mo - Burlingame CA, US
Yiyi Miao - San Mateo CA, US
Assignee:
OPSWAT, Inc. - San Francisco CA
International Classification:
H04L 29/06
Abstract:
Embodiments of the present invention include methods involving an authentication application, a client application, or a combination of a network access control server with the authentication application and the client application. The client application collects compliance data regarding the user device and communicates the compliance data to the network access control server. The network access control server generates a compliance check result based on whether the compliance data indicates that the user device is compliant with a security policy for the software-as-a-service server. The authentication application grants access by the user device when the compliance check result is positive; and the authentication application denies access by the user device when the compliance check result is negative. In some embodiments, the compliance check result or a user device identifier is stored in a web browser cookie or a client certificate on the user device.

Determining Whether A Data Storage Is Encrypted

View page
US Patent:
20180293180, Oct 11, 2018
Filed:
Jun 15, 2018
Appl. No.:
16/009512
Inventors:
- San Francisco CA, US
Jianpeng Mo - Burlingame CA, US
Boris Dynin - Menlo Park CA, US
Assignee:
OPSWAT, Inc. - San Francisco CA
International Classification:
G06F 12/14
G06F 17/30
G06F 3/06
G06F 7/02
G06F 21/85
G06F 21/62
G06F 21/60
G06F 3/12
G06F 21/00
Abstract:
A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.

Computer Security Vulnerability Assessment

View page
US Patent:
20180091543, Mar 29, 2018
Filed:
Jul 31, 2017
Appl. No.:
15/664670
Inventors:
- San Francisco CA, US
Jianpeng Mo - Burlingame CA, US
Ali Rezafard - Millbrae CA, US
David Matthew Patt - Kansas City MO, US
Assignee:
OPSWAT, Inc. - San Francisco CA
International Classification:
H04L 29/06
G06F 17/30
G06F 21/57
Abstract:
Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.

Determining Whether A Data Storage Is Encrypted

View page
US Patent:
20170300429, Oct 19, 2017
Filed:
Jun 28, 2017
Appl. No.:
15/636520
Inventors:
- San Francisco CA, US
Jianpeng Mo - Burlingame CA, US
Boris Dynin - Menlo Park CA, US
Assignee:
OPSWAT, Inc. - San Francisco CA
International Classification:
G06F 12/14
G06F 3/06
G06F 3/06
G06F 3/06
G06F 21/62
Abstract:
A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.

Determining Whether A Data Storage Is Encrypted

View page
US Patent:
20170032133, Feb 2, 2017
Filed:
Oct 17, 2016
Appl. No.:
15/294861
Inventors:
- San Francisco CA, US
Jianpeng Mo - Burlingame CA, US
Boris Dynin - Menlo Park CA, US
Assignee:
OPSWAT, Inc. - San Francisco CA
International Classification:
G06F 21/60
G06F 21/62
G06F 7/02
Abstract:
A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.

Network Access Control With Compliance Policy Check

View page
US Patent:
20160197962, Jul 7, 2016
Filed:
Mar 14, 2016
Appl. No.:
15/069459
Inventors:
- San Francisco CA, US
Benjamin Czarny - San Francisco CA, US
Jianpeng Mo - Burlingame CA, US
Yiyi Miao - San Mateo CA, US
International Classification:
H04L 29/06
Abstract:
Embodiments of the present invention include methods involving an authentication application, a client application, or a combination of a network access control server with the authentication application and the client application. The client application collects compliance data regarding the user device and communicates the compliance data to the network access control server. The network access control server generates a compliance check result based on whether the compliance data indicates that the user device is compliant with a security policy for the software-as-a-service server. The authentication application grants access by the user device when the compliance check result is positive; and the authentication application denies access by the user device when the compliance check result is negative. In some embodiments, the compliance check result or a user device identifier is stored in a web browser cookie or a client certificate on the user device.
Jianpeng Mo from Burlingame, CA, age ~40 Get Report