Patents by Inventor Bin ZAN

Bin ZAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11847481
    Abstract: A feature selection methodology is disclosed. In a computer-implemented method, components of a computing environment are automatically monitored, and have a feature selection analysis performed thereon. Provided the feature selection analysis determines that features of the components are well defined, a classification of the features is performed. Provided the feature selection analysis determines that features of the components are not well defined, a similarity analysis of the features is performed. Results of the feature selection methodology are generated.
    Type: Grant
    Filed: July 17, 2019
    Date of Patent: December 19, 2023
    Assignee: VMware, Inc.
    Inventors: Bin Zan, Zhen Mo, Vijay Ganti, Vamsi Krishna Akkineni
  • Publication number: 20230388114
    Abstract: Exemplary methods, apparatuses, and systems include a central controller receiving a request to generate a new encryption key for a security group to replace a current encryption key for the security group. The security group includes a plurality of hosts that each encrypt and decrypt communications using the current encryption key. In response to receiving the request, the central controller determines that a threshold period following generation of the current encryption key has not expired. In response to determining that the threshold period has not expired, the central controller delays execution of the request until the expiration of the threshold period. In response to the expiration of the threshold period, the central controller executes the request by generating the new encryption key, storing a time of creation of the new encryption key, and transmitting the new encryption key to the plurality of hosts.
    Type: Application
    Filed: July 25, 2023
    Publication date: November 30, 2023
    Inventors: Gang XU, Bin QIAN, Ganesan CHANDRASHEKHAR, Bin ZAN
  • Patent number: 11750381
    Abstract: Exemplary methods, apparatuses, and systems include a central controller receiving a request to generate a new encryption key for a security group to replace a current encryption key for the security group. The security group includes a plurality of hosts that each encrypt and decrypt communications using the current encryption key. In response to receiving the request, the central controller determines that a threshold period following generation of the current encryption key has not expired. In response to determining that the threshold period has not expired, the central controller delays execution of the request until the expiration of the threshold period. In response to the expiration of the threshold period, the central controller executes the request by generating the new encryption key, storing a time of creation of the new encryption key, and transmitting the new encryption key to the plurality of hosts.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: September 5, 2023
    Assignee: NICIRA, INC.
    Inventors: Gang Xu, Bin Qian, Ganesan Chandrashekhar, Bin Zan
  • Patent number: 11741236
    Abstract: A feature selection methodology is disclosed. In a computer-implemented method, the feature selection methodology automatically monitors components of a computing environment. The feature selection methodology then determines the importance of various components of the computing environment. The feature selection methodology further outputs results of the determining of the importance of the components within the computing device.
    Type: Grant
    Filed: July 17, 2019
    Date of Patent: August 29, 2023
    Assignee: VMware, Inc.
    Inventors: Bin Zan, Zhen Mo, Vijay Ganti, Vamsi Krishna Akkineni
  • Patent number: 11726829
    Abstract: An approach for an adaptive, performance-oriented, and compression-assisted encryption scheme implemented on a host computer to adaptively improve utilization of CPU resources is provided. The method comprises queueing a new data packet and determining a size of the new data packet. Based on historical data, a plurality of already encrypted data packets is determined. Based on information stored for the plurality of already encrypted data packets, an average ratio of compression for the plurality of already encrypted data packets is determined. Based on the average ratio of compression, a throughput of compression value and a throughput of encryption value, a prediction whether compressing the new data packet will reduce a CPU load is derived. If it is determined that compressing the new data packet will improve utilization of the CPU resources, then a compressed new data packet is generated by compressing the new data packet.
    Type: Grant
    Filed: September 3, 2020
    Date of Patent: August 15, 2023
    Assignee: Nicira, Inc.
    Inventors: Dexiang Wang, Calvin Qian, Dan Wing, Gang Xu, Bin Zan
  • Patent number: 11645539
    Abstract: Machine learning-based techniques for representing computing processes as vectors are provided. In one set of embodiments, a computer system can receive a name of a computing process and context information pertaining to the computing process. The computer system can further train a neural network based on the name and the context information, where the training results in determination of weight values for one or more hidden layers of the neural network. The computer system can then generate, based on the weight values, a vector representation of the computing process that encodes the context information and can perform one or more analyses using the vector representation.
    Type: Grant
    Filed: July 22, 2019
    Date of Patent: May 9, 2023
    Assignee: VMWARE, INC.
    Inventors: Bin Zan, Zhen Mo, Vamsi Akkineni, Vijay Ganti
  • Patent number: 11620180
    Abstract: A computer-implemented method for determining whether data is anomalous includes generating a holo-entropy adaptive boosting model using, at least in part, a set of normal data. The holo-entropy adaptive boosting model includes a plurality of holo-entropy models and associated model weights for combining outputs of the plurality of holo-entropy models. The method further includes receiving additional data, and determining at least one of whether the additional data is normal or abnormal relative to the set of normal data or a score indicative of how abnormal the additional data is using, at least in part, the generated holo-entropy adaptive boosting model.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: April 4, 2023
    Assignee: VMWARE, INC.
    Inventors: Zhen Mo, Bin Zan, Vijay Ganti, Vamsi Akkineni, HengJun Tian
  • Patent number: 11316837
    Abstract: Certain embodiments described herein are generally directed to enabling a group of host machines within a network to securely communicate an unknown unicast packet. In some embodiments, a key policy is defined exclusively for the secure communication of unknown unicast packets. The key policy is transmitted by a central controller to the group of host machines for negotiating session keys among each other when communicating unknown unicast packets.
    Type: Grant
    Filed: October 23, 2019
    Date of Patent: April 26, 2022
    Assignee: Nicira, Inc.
    Inventors: Sanal Pillai, Calvin Qian, Gang Xu, Bin Zan, Ganesan Chandrashekhar
  • Patent number: 11295011
    Abstract: Certain aspects herein provide a system and method for performing behavior analysis for a computing device by a computing system. In certain aspects, a method includes detecting an event occurring at the computing device at a first time, determining, based on the detecting, an event category of the event, and collecting first one or more behaviors associated with the determined event category occurring on the computing device based. The method also includes comparing the first one or more behaviors with a dataset indicating one or more expected behaviors of the computing device associated with the event. Upon determining that at least one of the first one or more behaviors corresponds to an unexpected behavior based on the comparing, the method further includes taking one or more remedial actions.
    Type: Grant
    Filed: January 8, 2019
    Date of Patent: April 5, 2022
    Assignee: VMware, Inc.
    Inventors: Ruimin Sun, Vijay Ganti, Zhen Mo, Bin Zan, Vamsi Akkineni
  • Patent number: 11258655
    Abstract: A method for managing alarms in a virtual machine environment includes receiving alarm data related to a process and storing the alarm data in a database, where the alarm data comprises one or more features. The method further includes retrieving intended state information for the process and comparing the one more features of the alarm data to the intended state information to determine whether the alarm is an outlier. The method also includes computing a normal score for the alarm if the alarm is not an outlier, and computing an abnormal score for the alarm if the alarm is an outlier. The method also includes sending a notification for the alarm and the computed score.
    Type: Grant
    Filed: December 6, 2018
    Date of Patent: February 22, 2022
    Assignee: VMware, Inc.
    Inventors: Zhen Mo, Dexiang Wang, Bin Zan, Vijay Ganti, Amit Chopra, Ruimin Sun
  • Publication number: 20220027409
    Abstract: An example method of representing a selected entity in a plurality of entities in a computing system includes: obtaining a graph representation of the plurality of entities, the graph representation having nodes and edges representing a hierarchy of the plurality of entities; extracting a set of paths from the graph representation, each path in the set of paths including a series of edge-connected nodes in the graph representation; processing the set of paths to generate a vector representation of the selected entity, the vector representation having a plurality of elements representing a context of the selected entity within the graph representation; and providing the vector representation as input to an application executing in the computing system.
    Type: Application
    Filed: July 23, 2020
    Publication date: January 27, 2022
    Inventors: Srilakshmi LINGAMNENI, Barak RAZ, Bin ZAN, Zhen MO, Vijay GANTI
  • Patent number: 11122065
    Abstract: Feature vectors are abstracted from data describing application processes. The feature vectors are grouped to define non-anomalous clusters of feature vectors corresponding to normal application behavior. Subsequent feature vectors are considered anomalous if they do not fall within one of the non-anomalous clusters; alerts are issued for anomalous feature vectors. In addition, the subsequent feature vectors may be used to regroup feature vectors to adapt to changes in what constitutes normal application behavior.
    Type: Grant
    Filed: August 14, 2018
    Date of Patent: September 14, 2021
    Assignee: VMware, Inc.
    Inventors: Bin Zan, Dexiang Wang, Zhen Mo, Vijay Ganti
  • Publication number: 20210124622
    Abstract: An approach for an adaptive, performance-oriented, and compression-assisted encryption scheme implemented on a host computer to adaptively improve utilization of CPU resources is provided. The method comprises queueing a new data packet and determining a size of the new data packet. Based on historical data, a plurality of already encrypted data packets is determined. Based on information stored for the plurality of already encrypted data packets, an average ratio of compression for the plurality of already encrypted data packets is determined. Based on the average ratio of compression, a throughput of compression value and a throughput of encryption value, a prediction whether compressing the new data packet will reduce a CPU load is derived. If it is determined that compressing the new data packet will improve utilization of the CPU resources, then a compressed new data packet is generated by compressing the new data packet.
    Type: Application
    Filed: September 3, 2020
    Publication date: April 29, 2021
    Inventors: Dexiang WANG, Calvin QIAN, Dan WING, Gang XU, Bin ZAN
  • Publication number: 20210027121
    Abstract: Machine learning-based techniques for representing computing processes as vectors are provided. In one set of embodiments, a computer system can receive a name of a computing process and context information pertaining to the computing process. The computer system can further train a neural network based on the name and the context information, where the training results in determination of weight values for one or more hidden layers of the neural network. The computer system can then generate, based on the weight values, a vector representation of the computing process that encodes the context information and can perform one or more analyses using the vector representation.
    Type: Application
    Filed: July 22, 2019
    Publication date: January 28, 2021
    Inventors: Bin Zan, Zhen Mo, Vamsi Akkineni, Vijay Ganti
  • Publication number: 20210019422
    Abstract: A feature selection methodology is disclosed. In a computer-implemented method, the feature selection methodology automatically monitors components of a computing environment. The feature selection methodology then determines the importance of various components of the computing environment. The feature selection methodology further outputs results of the determining of the importance of the components within the computing device.
    Type: Application
    Filed: July 17, 2019
    Publication date: January 21, 2021
    Applicant: VMware, Inc.
    Inventors: Bin ZAN, Zhen MO, Vijay GANTI, Vamsi Krishna AKKINENI
  • Publication number: 20210019577
    Abstract: A feature selection methodology is disclosed. In a computer-implemented method, components of a computing environment are automatically monitored, and have a feature selection analysis performed thereon. Provided the feature selection analysis determines that features of the components are well defined, a classification of the features is performed. Provided the feature selection analysis determines that features of the components are not well defined, a similarity analysis of the features is performed. Results of the feature selection methodology are generated.
    Type: Application
    Filed: July 17, 2019
    Publication date: January 21, 2021
    Applicant: VMware, Inc.
    Inventors: Bin ZAN, Zhen MO, Vijay GANTI, Vamsi Krishna AKKINENI
  • Patent number: 10860712
    Abstract: A virtual computing instance (VCI) is protected against security threats by a security manager, monitoring a behavior of a VCI over an observation period. The method further includes, storing by the security manager a digital profile in a first database, wherein the digital profile comprises information indicative of the behavior. The method further includes, accessing by a detection system, the digital profile from the first database, and accessing by the detection system, an intended state associated with VCI, wherein the intended state comprises information indicative of a behavior from a second VCI. The method further includes, comparing at least part of the digital profile to the at least part of the intended state. The method further includes, determining by the detection system, that the VCI contains a security threat when information indicative of a behavior in the digital profile is an outlier.
    Type: Grant
    Filed: July 11, 2018
    Date of Patent: December 8, 2020
    Assignee: VMware, Inc.
    Inventors: Zhen Mo, Dexiang Wang, Bin Zan, Vijay Ganti, Amit Chopra
  • Patent number: 10768993
    Abstract: An approach for an adaptive, performance-oriented, and compression-assisted encryption scheme implemented on a host computer to adaptively improve utilization of CPU resources is provided. The method comprises queueing a new data packet and determining a size of the new data packet. Based on historical data, a plurality of already encrypted data packets is determined. Based on information stored for the plurality of already encrypted data packets, an average ratio of compression for the plurality of already encrypted data packets is determined. Based on the average ratio of compression, a throughput of compression value and a throughput of encryption value, a prediction whether compressing the new data packet will reduce a CPU load is derived. If it is determined that compressing the new data packet will improve utilization of the CPU resources, then a compressed new data packet is generated by compressing the new data packet.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: September 8, 2020
    Assignee: NICIRA, INC.
    Inventors: Dexiang Wang, Calvin Qian, Dan Wing, Gang Xu, Bin Zan
  • Publication number: 20200218800
    Abstract: Certain aspects herein provide a system and method for performing behavior analysis for a computing device by a computing system. In certain aspects, a method includes detecting an event occurring at the computing device at a first time, determining, based on the detecting, an event category of the event, and collecting first one or more behaviors associated with the determined event category occurring on the computing device based. The method also includes comparing the first one or more behaviors with a dataset indicating one or more expected behaviors of the computing device associated with the event. Upon determining that at least one of the first one or more behaviors corresponds to an unexpected behavior based on the comparing, the method further comprises taking one or more remedial actions.
    Type: Application
    Filed: January 8, 2019
    Publication date: July 9, 2020
    Inventors: Ruimin SUN, Vijay GANTI, Zhen MO, Bin ZAN, Vamsi AKKINENI
  • Publication number: 20200186409
    Abstract: A method for managing alarms in a virtual machine environment includes receiving alarm data related to a process and storing the alarm data in a database, where the alarm data comprises one or more features. The method further includes retrieving intended state information for the process and comparing the one more features of the alarm data to the intended state information to determine whether the alarm is an outlier. The method also includes computing a normal score for the alarm if the alarm is not an outlier, and computing an abnormal score for the alarm if the alarm is an outlier. The method also includes sending a notification for the alarm and the computed score.
    Type: Application
    Filed: December 6, 2018
    Publication date: June 11, 2020
    Inventors: Zhen MO, Dexiang WANG, Bin ZAN, Vijay GANTI, Amit CHOPRA, Ruimin SUN