Patents by Inventor Binyuan Chen

Binyuan Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11798044
    Abstract: Embodiments are directed to a pluggable architecture for performance of pricing operations. An embodiment of a storage medium includes instructions for installing multiple pricing methods at a pricing service including a pluggable architecture for pricing methods, each pricing method including a set of pricing functions; receiving a pricing request for a sales transaction including one or more sales items, the pricing request including a pricing context for each sales item; and performing a price calculation for the sales transaction, including resolving a pricing method for each sales item, applying the set of pricing functions for the resolved pricing method for each sales item, the application of the set of pricing functions being based at least in part on the pricing context for the sales item, calculating a price for each sales item based upon an outcome of the pricing functions, and aggregating the calculated prices for the sales items.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: October 24, 2023
    Assignee: Salesforce, Inc.
    Inventors: Mitchell Christensen, Parth Vijay Vaishnav, Wei Gao, Binyuan Chen
  • Publication number: 20210241329
    Abstract: Embodiments are directed to a pluggable architecture for performance of pricing operations. An embodiment of a storage medium includes instructions for installing multiple pricing methods at a pricing service including a pluggable architecture for pricing methods, each pricing method including a set of pricing functions; receiving a pricing request for a sales transaction including one or more sales items, the pricing request including a pricing context for each sales item; and performing a price calculation for the sales transaction, including resolving a pricing method for each sales item, applying the set of pricing functions for the resolved pricing method for each sales item, the application of the set of pricing functions being based at least in part on the pricing context for the sales item, calculating a price for each sales item based upon an outcome of the pricing functions, and aggregating the calculated prices for the sales items.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Inventors: Mitchell Christensen, Parth Vijay Vaishnav, Wei Gao, Binyuan Chen
  • Patent number: 10726119
    Abstract: In a virtualized computer system, gray applications that are selected to be executed in a first virtual computing instance are executed and monitored in a second virtual computing instance that is a clone of the first virtual computing instance, and classified according to their monitored behavior. This process is conducted in real-time, in response to a notification that a gray application has been selected for execution in the first virtual computing instance. The execution of the gray application in the first virtual computing instance is delayed until the first virtual computing instance receives a notification from an application admission control manager that the gray application is safe to be executed in the first virtual computing instance.
    Type: Grant
    Filed: December 8, 2014
    Date of Patent: July 28, 2020
    Assignee: VMware, Inc.
    Inventors: Azeem Feroz, Binyuan Chen
  • Publication number: 20200195612
    Abstract: A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is intercepted by an agent prior to the request reaching a transport layer in the first context. A context refers to virtualization software, a physical computer, or a combination of virtualization software and physical computer. In response to the interception of the request, the agent requests a decision on whether to allow or deny the network socket event request to be communicated to a security server executing in a second context that is distinct from the first context. The request for a decision includes an identification of the application. The agent then receives from the security server either an allowance or a denial of the network socket event request, the allowance or denial being based at least in part on the identification of the application and a security policy.
    Type: Application
    Filed: October 21, 2019
    Publication date: June 18, 2020
    Inventors: Azeem Feroz, Binyuan Chen, Amit Chopra
  • Patent number: 10454895
    Abstract: A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is intercepted by an agent prior to the request reaching a transport layer in the first context. A context refers to virtualization software, a physical computer, or a combination of virtualization software and physical computer. In response to the interception of the request, the agent requests a decision on whether to allow or deny the network socket event request to be communicated to a security server executing in a second context that is distinct from the first context. The request for a decision includes an identification of the application. The agent then receives from the security server either an allowance or a denial of the network socket event request, the allowance or denial being based at least in part on the identification of the application and a security policy.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: October 22, 2019
    Assignee: VMware, Inc.
    Inventors: Azeem Feroz, Binyuan Chen, Amit Chopra
  • Publication number: 20190155938
    Abstract: In various embodiments, a system of synchronizing data is described. The system may store data associated with a plurality of data vendors. The system may synchronize the stored data with data from a first data vendor. The received data may be parsed by identifying data values indicated by associated metadata, and modifying the data values based on a universal data format. The system may also receive synchronization requests from a user of the service. The synchronization requests may indicate requested data and a list of processing operations. The requested data may correspond to data received from multiple data vendors. The system may perform the list of processing operations and return the data. Accordingly, the system may manage data received from multiple data vendors even if the data vendors have different synchronization conditions and provide the data in different formats. The data may be analyzed and output together to a user.
    Type: Application
    Filed: June 12, 2018
    Publication date: May 23, 2019
    Inventors: Dmytro Kudriavtsev, Pawan Nachnani, Dmytro Kashyn, Binyuan Chen, Satya Venkata Kamuju, Harini Vaidhyanathan, Venkata Muralidhar Tejomurtula, Shouzhong Shi, Ajitesh Jain, Prabhjot Singh
  • Patent number: 9760712
    Abstract: Methods and systems for protecting a virtual machine network are disclosed. In an embodiment, a method involves storing an application whitelist including application-to-user associations in memory such that the application whitelist is immutable by a guest virtual machine, receiving a request to execute an application including an application identifier and a user identifier, comparing the application identifier and the user identifier of the request with the application whitelist, and generating an execution decision indicating whether the requested application can execute on the guest virtual machine.
    Type: Grant
    Filed: May 23, 2014
    Date of Patent: September 12, 2017
    Assignee: VMware, Inc.
    Inventors: Azeem Feroz, Binyuan Chen, Prasad Sharad Dabak
  • Publication number: 20160380972
    Abstract: A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is intercepted by an agent prior to the request reaching a transport layer in the first context. A context refers to virtualization software, a physical computer, or a combination of virtualization software and physical computer. In response to the interception of the request, the agent requests a decision on whether to allow or deny the network socket event request to be communicated to a security server executing in a second context that is distinct from the first context. The request for a decision includes an identification of the application. The agent then receives from the security server either an allowance or a denial of the network socket event request, the allowance or denial being based at least in part on the identification of the application and a security policy.
    Type: Application
    Filed: September 12, 2016
    Publication date: December 29, 2016
    Inventors: Azeem Feroz, Binyuan Chen, Amit Chopra
  • Patent number: 9444841
    Abstract: A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is intercepted by an agent prior to the request reaching a transport layer in the first context. A context refers to virtualization software, a physical computer, or a combination of virtualization software and physical computer. In response to the interception of the request, the agent requests a decision on whether to allow or deny the network socket event request to be communicated to a security server executing in a second context that is distinct from the first context. The request for a decision includes an identification of the application. The agent then receives from the security server either an allowance or a denial of the network socket event request, the allowance or denial being based at least in part on the identification of the application and a security policy.
    Type: Grant
    Filed: February 14, 2013
    Date of Patent: September 13, 2016
    Assignee: VMware, Inc.
    Inventors: Azeem Feroz, Binyuan Chen, Amit Chopra
  • Publication number: 20160162685
    Abstract: In a virtualized computer system, gray applications that are selected to be executed in a first virtual computing instance are executed and monitored in a second virtual computing instance that is a clone of the first virtual computing instance, and classified according to their monitored behavior. This process is conducted in real-time, in response to a notification that a gray application has been selected for execution in the first virtual computing instance. The execution of the gray application in the first virtual computing instance is delayed until the first virtual computing instance receives a notification from an application admission control manager that the gray application is safe to be executed in the first virtual computing instance.
    Type: Application
    Filed: December 8, 2014
    Publication date: June 9, 2016
    Inventors: Azeem FEROZ, Binyuan CHEN
  • Publication number: 20150339475
    Abstract: Methods and systems for protecting a virtual machine network are disclosed. In an embodiment, a method involves storing an application whitelist including application-to-user associations in memory such that the application whitelist is immutable by a guest virtual machine, receiving a request to execute an application including an application identifier and a user identifier, comparing the application identifier and the user identifier of the request with the application whitelist, and generating an execution decision indicating whether the requested application can execute on the guest virtual machine.
    Type: Application
    Filed: May 23, 2014
    Publication date: November 26, 2015
    Applicant: VMWARE, INC.
    Inventors: Azeem Feroz, Binyuan Chen, Prasad Sharad Dabak
  • Publication number: 20140230008
    Abstract: A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is intercepted by an agent prior to the request reaching a transport layer in the first context. A context refers to virtualization software, a physical computer, or a combination of virtualization software and physical computer. In response to the interception of the request, the agent requests a decision on whether to allow or deny the network socket event request to be communicated to a security server executing in a second context that is distinct from the first context. The request for a decision includes an identification of the application. The agent then receives from the security server either an allowance or a denial of the network socket event request, the allowance or denial being based at least in part on the identification of the application and a security policy.
    Type: Application
    Filed: February 14, 2013
    Publication date: August 14, 2014
    Applicant: VMware, Inc.
    Inventors: Azeem Feroz, Binyuan Chen, Amit Chopra