Patents by Inventor Yingjun Tian

Yingjun Tian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11637845
    Abstract: A malicious attack detection method includes receiving, by a controller, a packet-in message sent by a switch, sending, by the controller, an abnormal flow entry to the switch, receiving, by the controller, a triggering count sent by the switch, where the triggering count is a quantity of times that the abnormal flow entry is triggered, and determining, according to the triggering count, whether a malicious attack is initiated.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: April 25, 2023
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Ke Lin, Yongcan Wang, Yingjun Tian
  • Patent number: 10594586
    Abstract: A dialing test method, a dialing test system, and a computing node relate to the network field. In this method, a dialing test system respectively creates a two dialing test ports on two computing nodes, where both Internet Protocol (IP) addresses of the two dialing test ports are IP addresses of a dialing test network, and the dialing test network does not overlap a service network of a virtual machine (VM). The dialing test system separately deploys respective dialing test resources for the two dialing test ports, and the dialing test resources does not overlap a resource of the VM on the two computing nodes, and the dialing test system triggers a dialing test procedure such that a dialing test task is executed between the two dialing test ports using the dialing test resources.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: March 17, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Zhengxian Zhang, Yingjun Tian, Yu Zhang
  • Publication number: 20190281081
    Abstract: A malicious attack detection method includes receiving, by a controller, a packet-in message sent by a switch, sending, by the controller, an abnormal flow entry to the switch, receiving, by the controller, a triggering count sent by the switch, where the triggering count is a quantity of times that the abnormal flow entry is triggered, and determining, according to the triggering count, whether a malicious attack is initiated.
    Type: Application
    Filed: May 17, 2019
    Publication date: September 12, 2019
    Inventors: Ke Lin, Yongcan Wang, Yingjun Tian
  • Patent number: 10326527
    Abstract: An optical transceiver and a method of making the same. The optical transceiver includes a base/housing having a roughened or darkened optics mounting surface, a transmitter optical subassembly (TOSA), a receiver optical subassembly (ROSA), a beam splitter mount secured to or mounted on the roughened or darkened optics mounting surface, a beam splitter secured to or mounted on the beam splitter mount, and an optical fiber adapter. The TOSA includes a laser diode configured to convert a received electrical signal to an outgoing optical signal. The ROSA includes a photodiode configured to convert a received optical signal to an outgoing electrical signal. The beam splitter is transparent to one of the outgoing and received optical signals and is configured to reflect the other. The optical fiber adapter is configured to hold an optical fiber that receives the outgoing optical signal and provides the received optical signal.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: June 18, 2019
    Assignee: SOURCE PHOTONICS (CHENGDU) CO., LTD.
    Inventors: Yongbu Hailai, Ke Liu, Xuanqi Zhang, Yingjun Tian
  • Patent number: 10313375
    Abstract: A malicious attack detection method includes: receiving, by a controller, a Packet-in message sent by a switch, where the Packet-in message includes a source host identifier and a destination host identifier of a data packet for which the switch does not find a flow entry; when determining that a host indicated by the destination host identifier does not exist in an SDN network, sending, by the controller, an abnormal flow entry to the switch; receiving, by the controller, a triggering count sent by the switch, where the triggering count is a quantity of times that the abnormal flow entry is triggered; and determining, according to the triggering count, whether a malicious attack is initiated. According to the method, a malicious attack from a host can be detected, a data processing volume of a controller can be reduced, and performance of the controller can be improved.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: June 4, 2019
    Assignee: HUAWEI TECHNOLOGIES CO., LTD
    Inventors: Ke Lin, Yongcan Wang, Yingjun Tian
  • Publication number: 20190103919
    Abstract: An optical transceiver and a method of making the same. The optical transceiver includes a base/housing having a roughened or darkened optics mounting surface, a transmitter optical subassembly (TOSA), a receiver optical subassembly (ROSA), a beam splitter mount secured to or mounted on the roughened or darkened optics mounting surface, a beam splitter secured to or mounted on the beam splitter mount, and an optical fiber adapter. The TOSA includes a laser diode configured to convert a received electrical signal to an outgoing optical signal. The ROSA includes a phoiodiode configured to convert a received optical signal to an outgoing electrical signal. The beam splitter is transparent to one of the outgoing and received optical signals and is configured to reflect the other. The optical fiber adapter is configured to hold an optical fiber that receives the outgoing optical signal and provides the received optical signal.
    Type: Application
    Filed: September 29, 2017
    Publication date: April 4, 2019
    Inventors: Yongbu HAILAI, Ke LIU, Xuanqi ZHANG, Yingjun TIAN
  • Patent number: 10122623
    Abstract: A preset flow table matching policy in a switching device is set, a flow table for processing data by a switching device that the data needs to pass through during forwarding and an action that needs to be executed in the flow table are generated according to the matching policy and capability information of the switching device, and the flow table is sent to the switching device that the data needs to pass through during forwarding such that the control device may generate, according to different flow table information of the switching device and with reference to different data forwarding policies, a corresponding flow table to be executed by the switching device, which manages switching devices of different types, and enables a switching device that has multiple flow tables to flexibly implement a data forwarding function in use of a preset policy.
    Type: Grant
    Filed: May 6, 2016
    Date of Patent: November 6, 2018
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Yongcan Wang, Ke Lin, Yingjun Tian
  • Publication number: 20180069778
    Abstract: A dialing test method, a dialing test system, and a computing node relate to the network field. In this method, a dialing test system respectively creates a two dialing test ports on two computing nodes, where both Internet Protocol (IP) addresses of the two dialing test ports are IP addresses of a dialing test network, and the dialing test network does not overlap a service network of a virtual machine (VM). The dialing test system separately deploys respective dialing test resources for the two dialing test ports, and the dialing test resources does not overlap a resource of the VM on the two computing nodes, and the dialing test system triggers a dialing test procedure such that a dialing test task is executed between the two dialing test ports using the dialing test resources.
    Type: Application
    Filed: October 31, 2017
    Publication date: March 8, 2018
    Inventors: Zhengxian Zhang, Yingjun Tian, Yu Zhang
  • Publication number: 20160269432
    Abstract: A malicious attack detection method includes: receiving, by a controller, a Packet-in message sent by a switch, where the Packet-in message includes a source host identifier and a destination host identifier of a data packet for which the switch does not find a flow entry; when determining that a host indicated by the destination host identifier does not exist in an SDN network, sending, by the controller, an abnormal flow entry to the switch; receiving, by the controller, a triggering count sent by the switch, where the triggering count is a quantity of times that the abnormal flow entry is triggered; and determining, according to the triggering count, whether a malicious attack is initiated. According to the method, a malicious attack from a host can be detected, a data processing volume of a controller can be reduced, and performance of the controller can be improved.
    Type: Application
    Filed: May 20, 2016
    Publication date: September 15, 2016
    Applicant: HUAWEI TECHNOLOGIES CO.,LTD.
    Inventors: Ke Lin, Yongcan Wang, Yingjun Tian
  • Publication number: 20160254995
    Abstract: A preset flow table matching policy in a switching device is set, a flow table for processing data by a switching device that the data needs to pass through during forwarding and an action that needs to be executed in the flow table are generated according to the matching policy and capability information of the switching device, and the flow table is sent to the switching device that the data needs to pass through during forwarding such that the control device may generate, according to different flow table information of the switching device and with reference to different data forwarding policies, a corresponding flow table to be executed by the switching device, which manages switching devices of different types, and enables a switching device that has multiple flow tables to flexibly implement a data forwarding function in use of a preset policy.
    Type: Application
    Filed: May 6, 2016
    Publication date: September 1, 2016
    Inventors: Yongcan Wang, Ke Lin, Yingjun Tian
  • Patent number: 9065768
    Abstract: A method for distributing routing instructions to a plurality of nodes within an OpenFlow Software Defined Network (SDN) using a logically centralized multi-controller that comprises a plurality of controllers, wherein the method comprises receiving a plurality of incoming data packets, storing a plurality of current flow tables, queuing the incoming data packets, wherein the incoming data packets are queued based on the order received, processing the incoming data packets based on the order the incoming data packets were queued, wherein the incoming data packets that are first to be queued are the first to be processed, generating a plurality of flow tables by processing the incoming data packets, and transmitting the flow tables to the plurality of nodes when the flow tables have not been previously generated.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: June 23, 2015
    Assignee: Futurewei Technologies, Inc.
    Inventors: Min Luo, Yingjun Tian, Quancai Li, Jiao Wang
  • Publication number: 20140185450
    Abstract: A method for distributing routing instructions to a plurality of nodes within an OpenFlow Software Defined Network (SDN) using a logically centralized multi-controller that comprises a plurality of controllers, wherein the method comprises receiving a plurality of incoming data packets, storing a plurality of current flow tables, queuing the incoming data packets, wherein the incoming data packets are queued based on the order received, processing the incoming data packets based on the order the incoming data packets were queued, wherein the incoming data packets that are first to be queued are the first to be processed, generating a plurality of flow tables by processing the incoming data packets, and transmitting the flow tables to the plurality of nodes when the flow tables have not been previously generated.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Applicant: FUTUREWEI TECHNOLOGIES, INC.
    Inventors: Min Luo, Yingjun Tian, Quancai Li, Jiao Wang