Patents by Inventor Chengchen Hu
Chengchen Hu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11743134Abstract: Examples herein describe a programmable traffic management engine that includes both programmable and non-programmable hardware components. The non-programmable hardware components are used to generate features that can then be used to perform different traffic management algorithms. Depending on which traffic management algorithm the PTM engine is configured to do, the PTM engine may use a subset (or all) of the features to perform the algorithm. The programmable hardware components in the PTM engine are programmable (e.g., customizable) by the user to perform a selected algorithm using some or all of the features provided by the non-programmable hardware components.Type: GrantFiled: October 7, 2020Date of Patent: August 29, 2023Assignee: XILINX, INC.Inventors: Guanwen Zhong, Chengchen Hu, Gordon John Brebner
-
Patent number: 11641323Abstract: Examples herein describe an acceleration framework that includes a hybrid congestion control (CC) engine where some components are implemented in software (e.g., a CC algorithm) while other components are implemented in hardware (e.g., measurement and enforcement modules and a flexible processing unit). The hardware components can be designed to provide measurements that can be used by multiple different types of CC algorithms. Depending on which CC algorithms are currently enabled, the hardware components can be programmed to perform measurement, processing, and enforcement tasks, thereby freeing the CPUs in the host to perform other tasks. In this manner, the hybrid CC engine can have the flexibility of a pure software CC algorithm with the advantage of performing many of the operations associated with the CC algorithm in hardware.Type: GrantFiled: September 29, 2020Date of Patent: May 2, 2023Assignee: XILINX, INC.Inventors: Nguyen Duy Anh Tuan, Ji Yang, Chengchen Hu, Yan Zhang, Guanwen Zhong, Gordon John Brebner
-
Publication number: 20220358002Abstract: Embodiments herein describe a describe an interface shell in a SmartNIC that reduces data-copy overhead in CPU-centric solutions that rely on hardware compute engine (which can include one or more accelerators). The interface shell offloads tag matching and address translation without CPU involvement. Moreover, the interface shell enables the compute engine to read messages directly from the network without extra data copy—i.e., without first copying the data into the CPU's memory.Type: ApplicationFiled: May 4, 2021Publication date: November 10, 2022Inventors: Guanwen ZHONG, Chengchen HU, Gordon John BREBNER
-
Patent number: 11431815Abstract: Mining proxy acceleration may include receiving, within a mining proxy, packetized data from a mining pool server and determining, using the mining proxy, whether the packetized data qualifies for broadcast processing. In response to determining that the packetized data qualifies for broadcast processing, the packetized data can be modified using the mining proxy to generate broadcast data. The broadcast data can be broadcast, using the mining proxy, to a plurality of miners subscribed to the mining proxy.Type: GrantFiled: May 7, 2020Date of Patent: August 30, 2022Assignee: Xilinx, Inc.Inventors: Guanwen Zhong, Haris Javaid, Chengchen Hu, Ji Yang, Gordon J. Brebner
-
Publication number: 20220109613Abstract: Examples herein describe a programmable traffic management engine that includes both programmable and non-programmable hardware components. The non-programmable hardware components are used to generate features that can then be used to perform different traffic management algorithms. Depending on which traffic management algorithm the PTM engine is configured to do, the PTM engine may use a subset (or all) of the features to perform the algorithm. The programmable hardware components in the PTM engine are programmable (e.g., customizable) by the user to perform a selected algorithm using some or all of the features provided by the non-programmable hardware components.Type: ApplicationFiled: October 7, 2020Publication date: April 7, 2022Inventors: Guanwen ZHONG, Chengchen HU, Gordon John BREBNER
-
Patent number: 11290361Abstract: A device includes a programmable passive measurement hardware engine, a programmable active measurement hardware engine, and a configuration engine. The programmable passive measurement hardware engine is configured to collect statistical data, from data transmission at a network line rate, used for network measurement. The programmable active measurement hardware engine is configured to generate probe packets and wherein the programmable active measurement hardware engine is further configured to collect responses to the generated probe packets, wherein the collected responses are used for the network measurement. The configuration engine is configured to receive data settings and wherein the configuration engine is further configured to program the programmable passive measurement hardware engine and the programmable active measurement hardware engine with the received data settings.Type: GrantFiled: December 16, 2019Date of Patent: March 29, 2022Assignee: XILINX, INC.Inventors: Chengchen Hu, Ji Yang, Yan Zhang, Gordon J. Brebner, Siyi Qiao
-
Patent number: 10785226Abstract: The application relates to controlling access in a software-defined network (SDN). A controller in the SDN receives an access request from an application program. The controller determines whether an operation on a resource as specified in the access request belongs to a permission list corresponding to the application program. The permission list includes a list of permitted operations on the resource by the application program. When the operation as specified in the access request belongs to the permission list, the controller sends a reply message allowing access by the application program. In this way, accesses by the application program are restricted according to the permission list, and malicious attacks from the application program can be prevented to ensure network security.Type: GrantFiled: August 3, 2017Date of Patent: September 22, 2020Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Jinming Li, Yan Chen, Chengchen Hu
-
Patent number: 10728154Abstract: The present disclosure relates to the communications field, and specifically, to a flow table processing method and an apparatus. The method includes: monitoring, by a switch, a flow table load of the switch; when the flow table load of the switch exceeds a preset threshold, determining, by the switch, a diffusion target of a target data flow according to a matching rule of a diffusive flow table; and when the determined diffusion target is a neighboring switch of the switch, forwarding, by the switch, the target data flow to the neighboring switch. When the flow table load of the switch exceeds the preset threshold, the switch may have been attacked. A data flow that fails to be matched to a flow entry is forwarded to the neighboring switch according to a diffusion probability, for processing by the neighboring switch.Type: GrantFiled: February 9, 2018Date of Patent: July 28, 2020Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Jinming Li, Chengchen Hu, Peng Zhang
-
Patent number: 10652262Abstract: The present disclosure relates to a data flow forwarding abnormality detection method. In one example method, a switching device through which a to-be-detected data flow passes is determined by a controller. At least one flow entry in the switching device that matches the to-be-detected data flow is obtained. The at least one flow entry comprises actual traffic and a match field. The actual traffic is a value of a counter corresponding to the match field. An overdetermined equation set is established based on the actual traffic and theoretical traffic of a data flow in the switching device that matches the match field. Based on the overdetermined equation set, a determination is made on whether the at least one flow entry is abnormal.Type: GrantFiled: September 13, 2018Date of Patent: May 12, 2020Assignee: Huawei Technologies Co., Ltd.Inventors: Donghui Wang, Yadong Zhou, Chengchen Hu
-
Patent number: 10536321Abstract: The present disclosure discloses a message attack defense method and apparatus. The method includes: receiving, by a controller, a report message sent by at least one switch; respectively storing, by the controller in a switch queue corresponding to each switch, the received report message that is sent by each switch; and performing, by the controller, round-robin scheduling on the switch queue corresponding to each switch.Type: GrantFiled: August 11, 2017Date of Patent: January 14, 2020Assignee: Huawei Technologies Co., Ltd.Inventors: Jinming Li, Chengchen Hu, Huanzhao Wang
-
Publication number: 20190014139Abstract: The present disclosure relates to a data flow forwarding abnormality detection method. In one example method, a switching device through which a to-be-detected data flow passes is determined by a controller. At least one flow entry in the switching device that matches the to-be-detected data flow is obtained. The at least one flow entry comprises actual traffic and a match field. The actual traffic is a value of a counter corresponding to the match field. An overdetermined equation set is established based on the actual traffic and theoretical traffic of a data flow in the switching device that matches the match field. Based on the overdetermined equation set, a determination is made on whether the at least one flow entry is abnormal.Type: ApplicationFiled: September 13, 2018Publication date: January 10, 2019Inventors: Donghui WANG, Yadong ZHOU, Chengchen HU
-
Publication number: 20180167325Abstract: The present disclosure relates to the communications field, and specifically, to a flow table processing method and an apparatus. The method includes: monitoring, by a switch, a flow table load of the switch; when the flow table load of the switch exceeds a preset threshold, determining, by the switch, a diffusion target of a target data flow according to a matching rule of a diffusive flow table; and when the determined diffusion target is a neighboring switch of the switch, forwarding, by the switch, the target data flow to the neighboring switch. When the flow table load of the switch exceeds the preset threshold, the switch may have been attacked. A data flow that fails to be matched to a flow entry is forwarded to the neighboring switch according to a diffusion probability, for processing by the neighboring switch.Type: ApplicationFiled: February 9, 2018Publication date: June 14, 2018Inventors: Jinming Li, Chengchen Hu, Peng Zhang
-
Publication number: 20170359350Abstract: The application relates to controlling access in a software-defined network (SDN). A controller in the SDN receives an access request from an application program. The controller determines whether an operation on a resource as specified in the access request belongs to a permission list corresponding to the application program. The permission list includes a list of permitted operations on the resource by the application program. When the operation as specified in the access request belongs to the permission list, the controller sends a reply message allowing access by the application program. In this way, accesses by the application program are restricted according to the permission list, and malicious attacks from the application program can be prevented to ensure network security.Type: ApplicationFiled: August 3, 2017Publication date: December 14, 2017Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Jinming Li, Yan Chen, Chengchen Hu
-
Publication number: 20170338998Abstract: The present disclosure discloses a message attack defense method and apparatus. The method includes: receiving, by a controller, a report message sent by at least one switch; respectively storing, by the controller in a switch queue corresponding to each switch, the received report message that is sent by each switch; and performing, by the controller, round-robin scheduling on the switch queue corresponding to each switch.Type: ApplicationFiled: August 11, 2017Publication date: November 23, 2017Inventors: Jinming Li, Chengchen Hu, Huanzhao Wang