Patents by Inventor Zikang Chen

Zikang Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11570147
    Abstract: Some embodiments of the invention provide a method for a first security controller that performs security operations on the packets that are transmitted within a network. The method of some embodiments receives a packet from a forwarding element in the network based on a decision made by a security agent that operates along with the forwarding element. When the first security controller stores a security rule for the packet, the method processes the packet according to the stored security rule. When the first security controller does not store a security rule for the packet, the method (i) determines that a second security controller stores a security rule for the packet based on a set of header values of the packet, and (ii) sends the packet to the second security controller for security processing according to the security rule for the packet stored on the second security controller.
    Type: Grant
    Filed: November 2, 2018
    Date of Patent: January 31, 2023
    Assignee: NICIRA, INC.
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen
  • Publication number: 20190075079
    Abstract: Some embodiments of the invention provide a method for a first security controller that performs security operations on the packets that are transmitted within a network. The method of some embodiments receives a packet from a forwarding element in the network based on a decision made by a security agent that operates along with the forwarding element. When the first security controller stores a security rule for the packet, the method processes the packet according to the stored security rule. When the first security controller does not store a security rule for the packet, the method (i) determines that a second security controller stores a security rule for the packet based on a set of header values of the packet, and (ii) sends the packet to the second security controller for security processing according to the security rule for the packet stored on the second security controller.
    Type: Application
    Filed: November 2, 2018
    Publication date: March 7, 2019
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen
  • Patent number: 10142287
    Abstract: Some embodiments of the invention provide a method for a first security controller that performs security operations on the packets that are transmitted within a network. The method of some embodiments receives a packet from a forwarding element in the network based on a decision made by a security agent that operates along with the forwarding element. When the first security controller stores a security rule for the packet, the method processes the packet according to the stored security rule. When the first security controller does not store a security rule for the packet, the method (i) determines that a second security controller stores a security rule for the packet based on a set of header values of the packet, and (ii) sends the packet to the second security controller for security processing according to the security rule for the packet stored on the second security controller.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: November 27, 2018
    Assignee: NICIRA, INC.
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen
  • Patent number: 9930010
    Abstract: Some embodiments of the invention provide a method that performs security operations for packets that are processed by a forwarding element. The method of some embodiments receives, at a security agent operating on a physical machine, a packet from a forwarding element that also operates on the physical machine. The method then determines whether a security rule is stored for the packet at the security agent. When no security rule is stored for the packet, the method transmits the packet to a default security controller of several security controllers that store security rules for a network and process packets according to the stored security rules. When the security rule is stored for the packet, the method processes the packet according to the stored security rule for the packet.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: March 27, 2018
    Assignee: NICIRA, INC.
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen
  • Publication number: 20160294776
    Abstract: Some embodiments of the invention provide a method for a first security controller that performs security operations on the packets that are transmitted within a network. The method of some embodiments receives a packet from a forwarding element in the network based on a decision made by a security agent that operates along with the forwarding element. When the first security controller stores a security rule for the packet, the method processes the packet according to the stored security rule. When the first security controller does not store a security rule for the packet, the method (i) determines that a second security controller stores a security rule for the packet based on a set of header values of the packet, and (ii) sends the packet to the second security controller for security processing according to the security rule for the packet stored on the second security controller.
    Type: Application
    Filed: July 28, 2015
    Publication date: October 6, 2016
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen
  • Publication number: 20160294874
    Abstract: Some embodiments of the invention provide a method that performs security operations for packets that are processed by a forwarding element. The method of some embodiments receives, at a security agent operating on a physical machine, a packet from a forwarding element that also operates on the physical machine. The method then determines whether a security rule is stored for the packet at the security agent. When no security rule is stored for the packet, the method transmits the packet to a default security controller of several security controllers that store security rules for a network and process packets according to the stored security rules. When the security rule is stored for the packet, the method processes the packet according to the stored security rule for the packet.
    Type: Application
    Filed: July 28, 2015
    Publication date: October 6, 2016
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen