Patents by Inventor Yingxian Wang

Yingxian Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10187275
    Abstract: A solution is provided for associating network traffic traversing a networked environment according to a selected category item, such as a user name or other network entity identity-related information. The solution includes a collector and a monitor. The collector extracts a user name and a network address from an event log maintained on the networked environment. The monitor receives the network traffic and identifies at least one packet having a network address that matches the extracted network address. After at least one of the packets is identified, the collector associates the identified packet(s) with the extracted user name.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: January 22, 2019
    Assignee: VMware, Inc.
    Inventors: Pramod John, Yingxian Wang, Ramachandran V. Marti, Maxine R. Erlund
  • Publication number: 20180157690
    Abstract: The disclosure is directed to a data publishing service that provides a low-latency read access to data. Some applications store data in a format that is not suitable or efficient for retrieving the data in real-time or near real-time. The data publishing service converts the data into a format, e.g., key-value pairs, that provides a low-latency read access to the data. A low-latency read access is a feature that enables retrieval of data in real-time, near real-time, or within a specified read latency. The data publishing service also provides an application programming interface (API), which can be used by a client for accessing the data. The data publishing service can be used to provide low-latency read access to data stored in data sources of various storage formats, e.g., data stored in relational database, log files, or as objects in object-oriented databases.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 7, 2018
    Inventors: Adela Kabiljo, Qi Hu, Pol Mauri Ruiz, Prashasti Baid, Shuai Shao, Jichuan Lu, Yingxian Wang, Hong Yan, Volodymyr Krestiannykov, Chunqiang Tang
  • Publication number: 20170141975
    Abstract: A solution is provided for associating network traffic traversing a networked environment according to a selected category item, such as a user name or other network entity identity-related information. The solution includes a collector and a monitor. The collector extracts a user name and a network address from an event log maintained on the networked environment. The monitor receives the network traffic and identifies at least one packet having a network address that matches the extracted network address. After at least one of the packets is identified, the collector associates the identified packet(s) with the extracted user name.
    Type: Application
    Filed: January 31, 2017
    Publication date: May 18, 2017
    Inventors: Pramod John, Yingxian Wang, Ramachandran V. Marti, Maxine R. Erlund
  • Patent number: 9584522
    Abstract: A solution is provided for associating network traffic traversing a networked environment according to a selected category item, such as a user name or other network entity identity-related information. The solution includes a collector and a monitor. The collector extracts a user name and a network address from an event log maintained on the networked environment. The monitor receives the network traffic and identifies at least one packet having a network address that matches the extracted network address. After at least one of the packets is identified, the collector associates the identified packet(s) with the extracted user name.
    Type: Grant
    Filed: April 4, 2006
    Date of Patent: February 28, 2017
    Assignee: VMware, Inc.
    Inventors: Pramod John, Yingxian Wang, Ramachandran V. Marti, Maxine R. Erlund
  • Publication number: 20170004525
    Abstract: A machine may be configured to generate metrics or billing reports for online advertising. For example, the machine accesses, in real time, an event cost value associated with an event of consumption of an online ad displayed on behalf of an advertiser associated with an account identifier. The machine accesses, in real time, a remaining budget value associated with the account identifier. The machine determines, in real time, that the event cost value exceeds the remaining budget value. The machine generates, in real time, an adjusted event cost value to correspond to the remaining budget value based on the determining that the event cost value exceeds the remaining budget value. The machine generates, in real time, a real-time billing report including the adjusted event cost value.
    Type: Application
    Filed: July 27, 2015
    Publication date: January 5, 2017
    Inventors: Waitat Peter Poon, Alexander Raymond Easton, Yingxian Wang
  • Publication number: 20130343543
    Abstract: A low-assurance call on a mobile device to another device may be promoted to a high-assurance call using a user interface. The participants during the call do not need to hang up and start a new high-assurance call. A caller can swipe an icon up a slider, for example, and start a process of promoting the call. The initial low assurance call using SIP servers is terminated but this is transparent to the callers. Once the swipe is performed, a DTLS negotiation is performed between the devices. During this DTLS handshake, which is done directly between the device without involvement of the SIP servers, a key is exchanged. Only the calling devices are aware of this key which is used to encrypt media during the call. Screens on the calling devices show that the call is now high-assurance and security details of the call may also be displayed.
    Type: Application
    Filed: June 25, 2013
    Publication date: December 26, 2013
    Inventors: James BLAISDELL, Yingxian WANG, Soo-Fei CHEW
  • Patent number: 8024779
    Abstract: A solution for transparently verifying the authentication of a real user includes a monitor that receives network packets and a collector. The monitor identifies an authentication exchange packet from network traffic, extracts information from the packet and sends it to the collector, which obtains objects from a directory service and determines if the information includes a user name equivalent to a name attribute in an object. If so, authentication is deemed verified. For additional verification, the monitor extracts from the packet a destination address if it is an response packet, or a source address if it is a request packet. Monitor sends the extracted address to the collector, which uses the extracted address to obtain a hostname and determines whether a user account associated with the name attribute is active on a computing device having the hostname. If so, the authentication of the real user is deemed further verified.
    Type: Grant
    Filed: April 4, 2006
    Date of Patent: September 20, 2011
    Assignee: PacketMotion, Inc.
    Inventors: Pramod John, Ramachandran V. Marti, Yingxian Wang, Maxine R. Erlund
  • Publication number: 20060190736
    Abstract: A solution for transparently verifying the authentication of a real user includes a monitor that receives network packets and a collector. The monitor identifies an authentication exchange packet from network traffic, extracts information from the packet and sends it to the collector, which obtains objects from a directory service and determines if the information includes a user name equivalent to a name attribute in an object. If so, authentication is deemed verified. For additional verification, the monitor extracts from the packet a destination address if it is an response packet, or a source address if it is a request packet. Monitor sends the extracted address to the collector, which uses the extracted address to obtain a hostname and determines whether a user account associated with the name attribute is active on a computing device having the hostname. If so, the authentication of the real user is deemed further verified.
    Type: Application
    Filed: April 4, 2006
    Publication date: August 24, 2006
    Inventors: Pramod John, Ramachandran Marti, Yingxian Wang, Maxine Erlund
  • Publication number: 20060179140
    Abstract: A solution is provided for associating network traffic traversing a networked environment according to a selected category item, such as a user name or other network entity identity-related information. The solution includes a collector and a monitor. The collector extracts a user name and a network address from an event log maintained on the networked environment. The monitor receives the network traffic and identifies at least one packet having a network address that matches the extracted network address. After at least one of the packets is identified, the collector associates the identified packet(s) with the extracted user name.
    Type: Application
    Filed: April 4, 2006
    Publication date: August 10, 2006
    Inventors: Pramod John, Yingxian Wang, Ramachandran Marti, Maxine Erlund