Patents by Inventor Bin ZAN

Bin ZAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200174867
    Abstract: A computer-implemented method for determining whether data is anomalous includes generating a holo-entropy adaptive boosting model using, at least in part, a set of normal data. The holo-entropy adaptive boosting model includes a plurality of holo-entropy models and associated model weights for combining outputs of the plurality of holo-entropy models. The method further includes receiving additional data, and determining at least one of whether the additional data is normal or abnormal relative to the set of normal data or a score indicative of how abnormal the additional data is using, at least in part, the generated holo-entropy adaptive boosting model.
    Type: Application
    Filed: November 29, 2018
    Publication date: June 4, 2020
    Inventors: Zhen MO, Bin ZAN, Vijay GANTI, Vamsi AKKINENI, HengJun TIAN
  • Publication number: 20200067889
    Abstract: Certain embodiments described herein are generally directed to enabling a group of host machines within a network to securely communicate an unknown unicast packet. In some embodiments, a key policy is defined exclusively for the secure communication of unknown unicast packets. The key policy is transmitted by a central controller to the group of host machines for negotiating session keys among each other when communicating unknown unicast packets.
    Type: Application
    Filed: October 23, 2019
    Publication date: February 27, 2020
    Inventors: Sanal PILLAI, Calvin QIAN, Gang XU, Bin ZAN, Ganesan CHANDRASHEKHAR
  • Publication number: 20200059482
    Abstract: Feature vectors are abstracted from data describing application processes. The feature vectors are grouped to define non-anomalous clusters of feature vectors corresponding to normal application behavior. Subsequent feature vectors are considered anomalous if they do not fall within one of the non-anomalous clusters; alerts are issued for anomalous feature vectors. In addition, the subsequent feature vectors may be used to regroup feature vectors to adapt to changes in what constitutes normal application behavior.
    Type: Application
    Filed: August 14, 2018
    Publication date: February 20, 2020
    Applicant: VMWARE, INC.
    Inventors: Bin ZAN, Dexiang WANG, Zhen MO MO, Vijay GANTI
  • Publication number: 20200019698
    Abstract: A virtual computing instance (VCI) is protected against security threats by a security manager, monitoring a behavior of a VCI over an observation period. The method further includes, storing by the security manager a digital profile in a first database, wherein the digital profile comprises information indicative of the behavior. The method further includes, accessing by a detection system, the digital profile from the first database, and accessing by the detection system, an intended state associated with VCI, wherein the intended state comprises information indicative of a behavior from a second VCI. The method further includes, comparing at least part of the digital profile to the at least part of the intended state. The method further includes, determining by the detection system, that the VCI contains a security threat when information indicative of a behavior in the digital profile is an outlier.
    Type: Application
    Filed: July 11, 2018
    Publication date: January 16, 2020
    Inventors: Zhen MO, Dexiang WANG, Bin ZAN, Vijay GANTI, Amit CHOPRA
  • Patent number: 10476850
    Abstract: Certain embodiments described herein are generally directed to enabling a group of host machines within a network to securely communicate an unknown unicast packet. In some embodiments, a key policy is defined exclusively for the secure communication of unknown unicast packets. The key policy is transmitted by a central controller to the group of host machines for negotiating session keys among each other when communicating unknown unicast packets.
    Type: Grant
    Filed: August 11, 2017
    Date of Patent: November 12, 2019
    Assignee: Nicira, Inc.
    Inventors: Sanal Pillai, Calvin Qian, Gang Xu, Bin Zan, Ganesan Chandrashekhar
  • Publication number: 20190102232
    Abstract: An approach for an adaptive, performance-oriented, and compression-assisted encryption scheme implemented on a host computer to adaptively improve utilization of CPU resources is provided. The method comprises queueing a new data packet and determining a size of the new data packet. Based on historical data, a plurality of already encrypted data packets is determined. Based on information stored for the plurality of already encrypted data packets, an average ratio of compression for the plurality of already encrypted data packets is determined. Based on the average ratio of compression, a throughput of compression value and a throughput of encryption value, a prediction whether compressing the new data packet will reduce a CPU load is derived. If it is determined that compressing the new data packet will improve utilization of the CPU resources, then a compressed new data packet is generated by compressing the new data packet.
    Type: Application
    Filed: September 29, 2017
    Publication date: April 4, 2019
    Applicant: NICIRA, INC.
    Inventors: Dexiang WANG, Calvin QIAN, Dan WING, Gang XU, Bin ZAN
  • Publication number: 20190028442
    Abstract: Certain embodiments described herein are generally directed to enabling a group of host machines within a network to securely communicate an unknown unicast packet. In some embodiments, a key policy is defined exclusively for the secure communication of unknown unicast packets. The key policy is transmitted by a central controller to the group of host machines for negotiating session keys among each other when communicating unknown unicast packets.
    Type: Application
    Filed: August 11, 2017
    Publication date: January 24, 2019
    Inventors: Sanal PILLAI, Calvin QIAN, Gang XU, Bin ZAN, Ganesan CHANDRASHEKHAR
  • Publication number: 20180316500
    Abstract: Exemplary methods, apparatuses, and systems include a central controller receiving a request to generate a new encryption key for a security group to replace a current encryption key for the security group. The security group includes a plurality of hosts that each encrypt and decrypt communications using the current encryption key. In response to receiving the request, the central controller determines that a threshold period following generation of the current encryption key has not expired. In response to determining that the threshold period has not expired, the central controller delays execution of the request until the expiration of the threshold period. In response to the expiration of the threshold period, the central controller executes the request by generating the new encryption key, storing a time of creation of the new encryption key, and transmitting the new encryption key to the plurality of hosts.
    Type: Application
    Filed: April 28, 2017
    Publication date: November 1, 2018
    Inventors: Gang XU, Bin QIAN, Ganesan CHANDRASHEKHAR, Bin ZAN