Patents by Inventor Ruotao Huang

Ruotao Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7379970
    Abstract: The present disclosure details a system, apparatus and method for reducing the redundant handling of distributed network events. In one aspect, a proxy node is selected from a plurality of network nodes and an associated network management station (“NMS”) preferably addresses only the distributed events received from the proxy node. In an alternate embodiment, non-proxy nodes may be limited to reporting node-specific events to the NMS, resulting in a reduction of the number of distributed events received and processed by the NMS to those sent by the proxy node. The proxy node may be selected by the NMS or by the network nodes, in alternate implementations. Availability of the proxy node may be monitored and ensured by the network nodes or by the NMS. The selection of a proxy node is generally repeated upon the addition of nodes to the network or a lapse in proxy node availability.
    Type: Grant
    Filed: April 5, 2002
    Date of Patent: May 27, 2008
    Assignee: Ciphermax, Inc.
    Inventors: Ruotao Huang, Ram Ganesan Iyer
  • Publication number: 20080086547
    Abstract: The present disclosure details a system, apparatus and method for reducing the redundant handling of distributed network events. In one aspect, a proxy node is selected from a plurality of network nodes and an associated network management station (“NMS”) preferably addresses only the distributed events received from the proxy node. In an alternate embodiment, non-proxy nodes may be limited to reporting node-specific events to the NMS, resulting in a reduction of the number of distributed events received and processed by the NMS to those sent by the proxy node. The proxy node may be selected by the NMS or by the network nodes, in alternate implementations. Availability of the proxy node may be monitored and ensured by the network nodes or by the NMS. The selection of a proxy node is generally repeated upon the addition of nodes to the network or a lapse in proxy node availability.
    Type: Application
    Filed: October 24, 2007
    Publication date: April 10, 2008
    Inventors: Ruotao Huang, Ram Iyer
  • Publication number: 20080065764
    Abstract: The present disclosure details a system, apparatus and method for reducing the redundant handling of distributed network events. In one aspect, a proxy node is selected from a plurality of network nodes and an associated network management station (“NMS”) preferably addresses only the distributed events received from the proxy node. In an alternate embodiment, non-proxy nodes may be limited to reporting node-specific events to the NMS, resulting in a reduction of the number of distributed events received and processed by the NMS to those sent by the proxy node. The proxy node may be selected by the NMS or by the network nodes, in alternate implementations. Availability of the proxy node may be monitored and ensured by the network nodes or by the NMS. The selection of a proxy node is generally repeated upon the addition of nodes to the network or a lapse in proxy node availability.
    Type: Application
    Filed: October 24, 2007
    Publication date: March 13, 2008
    Inventors: Ruotao Huang, Ram Iyer
  • Publication number: 20030195956
    Abstract: The present disclosure describes a method and apparatus for ensuring the unique zoning membership representation in a network environment. In one aspect, the members of a container may be evaluated to determine whether any are subordinate to or children of a target member of the same container. The subordinate or child members may be removed from the container's configuration. Generally following the removal of any subordinate or child members of the target member, a determination may be made as to whether the target member is a child of or subordinate to any container members remaining in the container's configuration. If the target member is determined to be subordinate to or a child of a remaining container member, the target member may be removed from the container's configuration. Consequently, redundant member entries, unintentional communication paths and the complexities associated with creating a zoning configuration may be avoided.
    Type: Application
    Filed: April 15, 2002
    Publication date: October 16, 2003
    Applicant: MaXXan Systems, Inc.
    Inventors: Walter Bramhall, Ruotao Huang