Patents by Inventor Chuanxiong Guo

Chuanxiong Guo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100180048
    Abstract: Disclosed are systems and methods for network architecture that is a server-centric network architectural design.
    Type: Application
    Filed: January 9, 2009
    Publication date: July 15, 2010
    Applicant: Microsoft Corporation
    Inventors: Chuanxiong Guo, Guohan Lu, Dan Li, Haitao Wu, Yunfeng Shi, Danfeng Zhang, Yongguang Zhang, Songwu Lu
  • Publication number: 20100153540
    Abstract: A geographic location of a network device is determined using response delay times from internet servers used as landmarks. A coordination server provides to a client a list of area landmark servers (ALS) with known geographic locations. The client probes ALSs, measures response delays, and provides results to the coordination server. The coordination server then provides to the client a list of additional city landmark servers (CLS) within the area. The client probes the CLSs and provides results to the coordination server which then determines the geographic location of the client.
    Type: Application
    Filed: December 16, 2008
    Publication date: June 17, 2010
    Applicant: Microsoft Corporation
    Inventors: Dan Li, Chuanxiong Guo, Yunxin Liu, Yongguang Zhang
  • Publication number: 20100153523
    Abstract: Large numbers of commodity servers in a data center may be inexpensively interconnected using low-cost commodity network switches, a first network port on each commodity server, a second network port on each commodity server, and a traffic-aware routing module executed on each commodity server. Connecting two or more commodity servers via the first network ports on each server to a commodity network switch forms a unit. Connecting two commodity servers in different units forms a group. Each unit has a direct connection via a second network port on a commodity server in the unit to another unit. Each group may have a direct connection via a second network port on a commodity server in the group to another group. Traffic-aware routing modules executed on each commodity server determine routing of data between servers and balance traffic across the first and second ports.
    Type: Application
    Filed: December 16, 2008
    Publication date: June 17, 2010
    Applicant: Microsoft Corporation
    Inventors: Dan Li, Chuanxiong Guo, Kun Tan, Haitao Wu, Yongguang Zhang
  • Patent number: 7694022
    Abstract: A method and system for protecting an application that implements a communication protocol against exploitation of a communication-based vulnerability is provided. A protection system provides a protection policy that specifies how to recognize messages that expose a specific vulnerability and specifies actions to take when the vulnerability is exposed. A protection policy specifies the sequence of messages and their payload characteristics that expose a vulnerability. The protection system may specify the sequences of messages using a message protocol state machine. A message protocol state machine of an application represents the states that the application transitions through as it receives various messages. The message protocol state machine of the protection policy may be a portion of the message protocol state machine of the application relating to the vulnerability. The protection system uses the message protocol state machine to track the states that lead up to the exposing of the vulnerability.
    Type: Grant
    Filed: September 30, 2004
    Date of Patent: April 6, 2010
    Assignee: Microsoft Corporation
    Inventors: Jason Garms, Chuanxiong Guo, Daniel R. Simon, Jiahe Helen Wang, Alf Peter Zugenmaier
  • Publication number: 20090274063
    Abstract: A method and system for providing a multi-level interconnection network is provided. A multi-level interconnection network comprises basic cells that are aggregated into higher level cells at each level of the network. At the first level, the basic cells are aggregated into first level cells. Each first level cell is an aggregation of a number of basic cells that is one more than the number of devices in a basic cell. The basic cells of a first level cell are fully connected; that is, each basic cell has a first level link or connection to each other basic cell. In a first level cell, each device of a basic cell has a first level link to each other basic cell. The multi-level interconnection network has higher level cells that are aggregations of lower level cells in a similar manner.
    Type: Application
    Filed: April 30, 2008
    Publication date: November 5, 2009
    Applicant: Microsoft Corporation
    Inventors: Chuanxiong Guo, Songwu Lu, Lei Shi, Kun Tan, Haitao Wu, Yongguang Zhang
  • Publication number: 20090274043
    Abstract: A method and system for providing a multi-level interconnection network is provided. A multi-level interconnection network comprises basic cells that are aggregated into higher level cells at each level of the network. At the first level, the basic cells are aggregated into first level cells. Each first level cell is an aggregation of a number of basic cells that is one more than the number of devices in a basic cell. The basic cells of a first level cell are fully connected; that is, each basic cell has a first level link or connection to each other basic cell. In a first level cell, each device of a basic cell has a first level link to each other basic cell. The multi-level interconnection network has higher level cells that are aggregations of lower level cells in a similar manner.
    Type: Application
    Filed: April 30, 2008
    Publication date: November 5, 2009
    Applicant: Microsoft Corporation
    Inventors: Chuanxiong Guo, Songwu Lu, Shi Lei, Kun Tan, Haitao Wu, Yongguang Zhang
  • Patent number: 7581010
    Abstract: A middle layer network protocol enhancement, virtual connectivity (VC) makes the network attachment point changes of local and remote peers transparent to applications that use network services. A virtual connectivity module local to each peer translates communication connection parameters from apparent to real and vice versa, as well as sending and receiving secure connection updates directly to and from peers. Unlike Mobile IP, no routing infrastructure modifications are required. A subscribe-notify service provides connection update notifications when direct peer-to-peer connection updates are not possible, for example, when two communicating peers move simultaneously or when the moving peer is communicating with a peer behind network address translation (NAT). Methods for detecting these conditions are disclosed, as is a virtual connectivity protocol and virtual connectivity module architecture.
    Type: Grant
    Filed: July 14, 2003
    Date of Patent: August 25, 2009
    Assignee: Microsoft Corporation
    Inventors: Chuanxiong Guo, Jun Yuan, Qian Zhang, Wenwu Zhu
  • Patent number: 7536467
    Abstract: An end host in a peer-to-peer system stores identifiers for both its peers and the neighbors of its peers. When the IP address of the end host and one of the peers changes, the end host's new IP address can be sent to each neighbor of the peer so that communication between the end host and the peer will not be lost. The order in which the neighbors of the peer are stored can be prioritized for faster delivery of the end host's changed IP address to the peer. The prioritizing can be by available bandwidth of the neighbors, proximity of the neighbors, trust between the peer and its neighbors, the probability that the IP address of the neighbors will change, etc. Proximity of the peers from each other and the end host can be a function of the identifier, which can be generated from a public key.
    Type: Grant
    Filed: April 20, 2004
    Date of Patent: May 19, 2009
    Assignee: Microsoft Corporation
    Inventors: Chuanxiong Guo, Haitao Wu, Kun Tan, Qian Zhang, Wenwu Zhu
  • Publication number: 20090100005
    Abstract: A network address mapping system is described. The network address mapping system can identify a set of Web pages, collects information from the Web pages indicating geographical locations (“geolocations”), and correlate the geolocations with the network addresses from which the identified Web pages are served. The collected information can be weighted based on various factors, such as its relative position in a Web page. The collected information can then be used to identify a geolocation. The network mapping system can deduce geolocations for portions of ranges of network addresses based on the score, and can infer geolocations for other portions based on the deduced geolocations. This mapping can then be stored in a database and provided as a geomapping service. The network address mapping system is able to map network addresses to geographical locations.
    Type: Application
    Filed: October 12, 2007
    Publication date: April 16, 2009
    Applicant: Microsoft Corporation
    Inventors: Chuanxiong Guo, Jiahe H. Wang, Qing Yu, Yongguang Zhang, Yunxin Liu
  • Publication number: 20080259867
    Abstract: A method and system for scheduling packets to provide fair bandwidth sharing is provided. A packet scheduling system is composed of a communication link and flows from different network applications. These flows share the same communication link and have different bandwidth reservation according to different application requirements. In this invention, the bandwidth of the communication link is expressed into its binary form, and the binary coefficients are used to form a Square Weight Matrix. Moreover, each non-zero binary coefficient is expressed by a Weighted Binary Tree. The Square Weight Matrix is further spread by a Weight Spread Sequence and each Weighted Binary Tree is spread into a Time-Slot Array by using a Binary Reversal operation. When a flow is accepted by the scheduling system, the system first expresses the requested bandwidth of the flow into binary form, and then for each non-zero coefficients, the system allocates a node with the same weight from the Weighted Binary Trees to the flow.
    Type: Application
    Filed: April 22, 2007
    Publication date: October 23, 2008
    Inventor: Chuanxiong Guo
  • Patent number: 7349978
    Abstract: A method for detecting a spurious timeout in a TCP network which can be used to avoid unnecessarily triggering the TCP rate adaptation is disclosed. Upon detection of a timeout on a given packet, a shortened packet version of the possibly lost packet is retransmitted. The retransmitted packet is at least one byte shorter than the original packet. The node receiving this retransmitted packet will acknowledge the receipt of the packet as specified in the TCP protocol. The acknowledgment will contain the sequence number of the lowest byte the receiving node has not yet received. Because the retransmitted packet is shorter than the original packet, the sequence number of this as yet not received byte will be less than or equal to the last byte of the original packet if the original packet was not received indicating a valid timeout.
    Type: Grant
    Filed: January 15, 2004
    Date of Patent: March 25, 2008
    Assignee: Microsoft Corporation
    Inventors: Kun Tan, Hongbin Liao, Chuanxiong Guo, Qian Zhang, Wenwu Zhu
  • Publication number: 20050251577
    Abstract: An end host in a peer-to-peer system stores identifiers for both its peers and the neighbors of its peers. When the IP address of the end host and one of the peers changes, the end host's new IP address can be sent to each neighbor of the peer so that communication between the end host and the peer will not be lost. The order in which the neighbors of the peer are stored can be prioritized for faster delivery of the end host's changed IP address to the peer. The prioritizing can be by available bandwidth of the neighbors, proximity of the neighbors, trust between the peer and its neighbors, the probability that the IP address of the neighbors will change, etc. Proximity of the peers from each other and the end host can be a function of the identifier, which can be generated from a public key.
    Type: Application
    Filed: April 20, 2004
    Publication date: November 10, 2005
    Inventors: Chuanxiong Guo, Haitao Wu, Kun Tan, Qian Zhang, Wenwu Zhu
  • Publication number: 20050198350
    Abstract: A method for detecting a spurious timeout in a TCP network which can be used to avoid unnecessarily triggering the TCP rate adaptation is disclosed. Upon detection of a timeout on a given packet, a shortened packet version of the possibly lost packet is retransmitted. The retransmitted packet is at least one byte shorter than the original packet. The node receiving this retransmitted packet will acknowledge the receipt of the packet as specified in the TCP protocol. The acknowledgment will contain the sequence number of the lowest byte the receiving node has not yet received. Because the retransmitted packet is shorter than the original packet, the sequence number of this as yet not received byte will be less than or equal to the last byte of the original packet if the original packet was not received indicating a valid timeout.
    Type: Application
    Filed: January 15, 2004
    Publication date: September 8, 2005
    Applicant: Microsoft Corporation
    Inventors: Kun Tan, Hongbin Liao, Chuanxiong Guo, Qian Zhang, Wenwu Zhu
  • Publication number: 20050198110
    Abstract: A method and system for protecting an application that implements a communication protocol against exploitation of a communication-based vulnerability is provided. A protection system provides a protection policy that specifies how to recognize messages that expose a specific vulnerability and specifies actions to take when the vulnerability is exposed. A protection policy specifies the sequence of messages and their payload characteristics that expose a vulnerability. The protection system may specify the sequences of messages using a message protocol state machine. A message protocol state machine of an application represents the states that the application transitions through as it receives various messages. The message protocol state machine of the protection policy may be a portion of the message protocol state machine of the application relating to the vulnerability. The protection system uses the message protocol state machine to track the states that lead up to the exposing of the vulnerability.
    Type: Application
    Filed: September 30, 2004
    Publication date: September 8, 2005
    Applicant: Microsoft Corporation
    Inventors: Jason Garms, Chuanxiong Guo, Daniel Simon, Jiahe Wang, Alf Zugenmaier
  • Publication number: 20050015496
    Abstract: A middle layer network protocol enhancement, virtual connectivity (VC) makes the network attachment point changes of local and remote peers transparent to applications that use network services. A virtual connectivity module local to each peer translates communication connection parameters from apparent to real and vice versa, as well as sending and receiving secure connection updates directly to and from peers. Unlike Mobile IP, no routing infrastructure modifications are required. A subscribe-notify service provides connection update notifications when direct peer-to-peer connection updates are not possible, for example, when two communicating peers move simultaneously or when the moving peer is communicating with a peer behind network address translation (NAT). Methods for detecting these conditions are disclosed, as is a virtual connectivity protocol and virtual connectivity module architecture.
    Type: Application
    Filed: July 14, 2003
    Publication date: January 20, 2005
    Applicant: Microsoft Corporation
    Inventors: Chuanxiong Guo, Jun Yuan, Qian Zhang, Wenwu Zhu
  • Publication number: 20050015427
    Abstract: A middle layer network protocol enhancement, virtual connectivity (VC) makes the network attachment point changes of local and remote peers transparent to applications that use network services. A virtual connectivity module local to each peer translates communication connection parameters from apparent to real and vice versa, as well as sending and receiving secure connection updates directly to and from peers. Unlike Mobile IP, no routing infrastructure modifications are required. A subscribe-notify service provides connection update notifications when direct peer-to-peer connection updates are not possible, for example, when two communicating peers move simultaneously or when the moving peer is communicating with a peer behind network address translation (NAT). Methods for detecting these conditions are disclosed, as is a virtual connectivity protocol and virtual connectivity module architecture.
    Type: Application
    Filed: July 14, 2003
    Publication date: January 20, 2005
    Applicant: Microsoft Corporation
    Inventors: Chuanxiong Guo, Jun Yuan, Qian Zhang, Wenwu Zhu