Patents by Inventor Changming Liu
Changming Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8218502Abstract: Wireless access points detect neighboring wireless access points in different subnets. Upon connecting with a wireless client, a wireless access point determines predictive roaming information for the wireless client. Predictive roaming information identifies the wireless client; its home network subnet; and includes connection information associated with the wireless client. The wireless access point forwards the predictive roaming information associated with a wireless client to neighboring wireless access points while the wireless client is still connected with the wireless access point. Neighboring wireless access points store received predictive roaming information. Upon connecting with a wireless client, a neighboring wireless access point determines if the wireless client matches the stored predictive roaming information.Type: GrantFiled: May 14, 2008Date of Patent: July 10, 2012Assignee: Aerohive NetworksInventors: Changming Liu, Yong Kang, Jianlin Zeng, Sreekanth Reddy
-
Publication number: 20120144191Abstract: A request to receive multicast data, associated with a multicast group, may be transmitted. The request may be transmitted via a tunnel. Group keys may be received in response to the request. The group keys may be based on the multicast group. An encapsulated packet may be received via another tunnel. The encapsulated packet may be processed, using the group keys, to obtain a multicast packet associated with the multicast data. The multicast packet may be forwarded to at least one multicast recipient.Type: ApplicationFiled: November 30, 2011Publication date: June 7, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Gregory M. Lebovitz, Changming Liu, Choung-Yaw Shieh
-
Publication number: 20120137358Abstract: A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier.Type: ApplicationFiled: February 9, 2012Publication date: May 31, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Changming LIU, Choung-Yaw SHIEH, Yonghui CHENG
-
Publication number: 20120058728Abstract: Wireless networking devices scan for available channels and gather data about the channels and the RF environment. Using this information, each wireless networking device determines a cost value for each available channel and a quality value for its overall RF neighborhood. Each wireless networking device select the channel with the best cost value as a candidate channel for use. The wireless networking devices may submit channel requests to the arbiter for approval. If two or more wireless networking devices are requesting the same channel, the arbiter assigns the channel to the wireless networking device with the worst RF neighborhood quality. The arbiter informs the wireless networking devices if their channel requests are approved. If a wireless networking device's channel request is not approved, the wireless networking device will rescan the remaining available channels to select a different candidate channel to be approved.Type: ApplicationFiled: September 7, 2010Publication date: March 8, 2012Applicant: AEROHIVE NETWORKSInventors: Huizhao Wang, Chris Scheers, Changming Liu
-
Patent number: 8132000Abstract: Secure tunneled multicast transmission and reception through a network is provided. A join request may be received from a second tunnel endpoint, the join request indicating a multicast group to be joined. Group keys may be transmitted to the second tunnel endpoint, where the group keys are based at least on the multicast group. A packet received at the first tunnel endpoint may be cryptographically processed to generate an encapsulated payload. A header may be appended to the encapsulated payload to form an encapsulated packet, wherein the header includes information associated with the second tunnel endpoint. A tunnel may be established between the first tunnel endpoint and the second tunnel endpoint based on the appended header. The encapsulated packet may be transmitted through the tunnel to the second tunnel endpoint. The second tunnel endpoint may receive the encapsulated packet. Cryptographic processing of the encapsulated packet may reveal the packet having a second header.Type: GrantFiled: July 30, 2009Date of Patent: March 6, 2012Assignee: Juniper Networks, Inc.Inventors: Gregory M Lebovitz, Changming Liu, Choung-Yaw Shieh
-
Patent number: 8127349Abstract: A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier.Type: GrantFiled: July 12, 2010Date of Patent: February 28, 2012Assignee: Juniper Networks, Inc.Inventors: Changming Liu, Choung-Yaw Shieh, Yonghui Cheng
-
Patent number: 8121026Abstract: A network device includes a group of interfaces. Each interface is associated with at least one other interface of the group of interfaces and a group of network addresses. Each interface is configured to monitor at least one of the group of network addresses with which the each interface is associated or the at least one other interface with which the each interface is associated, and determine whether to logically shut down based on the monitoring.Type: GrantFiled: September 29, 2009Date of Patent: February 21, 2012Assignee: Juniper Networks, Inc.Inventors: Changming Liu, Xiaosong Yang, Lin Chen
-
Publication number: 20110310742Abstract: In one aspect the invention provides a method for allocating bandwidth in a network appliance where the network appliance includes a plurality of guaranteed bandwidth buckets used to evaluate when to pass traffic through the network appliance. The method includes providing a shared bandwidth bucket associated with a plurality of the guaranteed bandwidth buckets, allocating bandwidth to the shared bandwidth bucket based on the underutilization of bandwidth in the plurality of guaranteed bandwidth buckets and sharing excess bandwidth developed from the underutilization of the guaranteed bandwidth allocated to the individual guaranteed bandwidth buckets. The step of sharing includes borrowing bandwidth from the shared bandwidth bucket by a respective guaranteed bandwidth bucket to allow traffic to pass immediately through the network appliance.Type: ApplicationFiled: August 31, 2011Publication date: December 22, 2011Applicant: JUNIPER NETWORKS, INC.Inventors: Changming LIU, Yan Ke
-
Patent number: 8032653Abstract: In one aspect the invention provides a method for allocating bandwidth in a network appliance where the network appliance includes a plurality of guaranteed bandwidth buckets used to evaluate when to pass traffic through the network appliance. The method includes providing a shared bandwidth bucket associated with a plurality of the guaranteed bandwidth buckets, allocating bandwidth to the shared bandwidth bucket based on the underutilization of bandwidth in the plurality of guaranteed bandwidth buckets and sharing excess bandwidth developed from the underutilization of the guaranteed bandwidth allocated to the individual guaranteed bandwidth buckets. The step of sharing includes borrowing bandwidth from the shared bandwidth bucket by a respective guaranteed bandwidth bucket to allow traffic to pass immediately through the network appliance.Type: GrantFiled: September 8, 2000Date of Patent: October 4, 2011Assignee: Juniper Networks, Inc.Inventors: Changming Liu, Yan Ke
-
Patent number: 7941826Abstract: Systems, apparatus, methods, and computer program products for multicast access control are provided to analyze incoming data based on a source zone and a destination zone of the incoming data. Appropriate access control rules are applied to incoming data based on the results of the analysis. Additional implementations of a multicast access control include using a proxy rendezvous point operable to function as a rendezvous point in place of a physical rendezvous point.Type: GrantFiled: April 6, 2010Date of Patent: May 10, 2011Assignee: Juniper Networks, Inc.Inventors: Changming Liu, Gregory M. Lebovitz, Purvi Desai
-
Publication number: 20110047154Abstract: A system protects database operations performed on a shared resource. The system may chunk memory to form a set of memory chunks which have memory blocks, at least some of the memory blocks including database objects. The system may configure at least one binary search tree using the memory chunks as nodes and buffer a set of pointers corresponding to the memory blocks. The system may further validate the buffered pointers and dereference validated buffered pointers.Type: ApplicationFiled: November 4, 2010Publication date: February 24, 2011Applicant: JUNIPER NETWORKS, INC.Inventors: Xiaosong YANG, Lin CHEN, Changming LIU
-
Publication number: 20100325486Abstract: A system includes a first network device and a second network device. The first network device includes a group of first logical portions and is configured to detect a problem with one of the first logical portions, and transmit a message identifying the one first logical portion. The second network device includes a group of second logical portions, where the group of second logical portions corresponds to the group of first logical portions. The second network device is configured to receive the message from the first network device, and activate the one second logical portion corresponding to the one first logical portion in response to receiving the message.Type: ApplicationFiled: August 30, 2010Publication date: December 23, 2010Applicant: JUNIPER NETWORKS, INC.Inventors: Changming LIU, Xiaosong Yang, Lin Chen
-
Patent number: 7853591Abstract: A system protects database operations performed on a shared resource. The system may chunk memory to form a set of memory chunks which have memory blocks, at least some of the memory blocks including database objects. The system may configure at least one binary search tree using the memory chunks as nodes and buffer a set of pointers corresponding to the memory blocks. The system may further validate the buffered pointers and dereference validated buffered pointers.Type: GrantFiled: June 30, 2006Date of Patent: December 14, 2010Assignee: Juniper Networks, Inc.Inventors: Xiaosong Yang, Lin Chen, Changming Liu
-
Patent number: 7848335Abstract: A virtual private network (VPN) tunnel is established that extends from a source spoke to a destination spoke in a hub-and-spoke enterprise network. Prior to establishing the VPN tunnel, packets are sent from the source spoke to the destination spoke through the hub network. In this manner, packets are not dropped while the VPN tunnel is being set up. The VPN tunnel is established by querying a server for the network address of a destination router in the destination spoke, then setting up the VPN tunnel using a secure communication protocol. An extension to the Internet Key Exchange (IKE) protocol is used to obtain the private network address of the destination router during setup of the VPN tunnel. A forwarding table is updated after the VPN tunnel is established to reroute the packets through the new VPN tunnel.Type: GrantFiled: October 27, 2005Date of Patent: December 7, 2010Assignee: Juniper Networks, Inc.Inventors: Yong Kang, Changming Liu, Yonghui Cheng
-
Patent number: 7839771Abstract: A method and corresponding system for providing for recovering from a failure of a wired link used for communication between the first access point and a wired network. The first access point has at least two radios including a first radio and a second radio each for providing a wireless communications link. The method including selectively configuring the radios in an access mode for enabling a communications path with a corresponding client node to enable each client node to have a communication path via the first access point to the wired network, wherein the first and second radios are enabled to be associated with a first and second client node, respectively. The method and system includes providing communications paths for the client nodes to the wired network in response to detection of loss of the wired link to the first access point by selectively reconfiguring the second radio to a backhaul mode.Type: GrantFiled: February 21, 2008Date of Patent: November 23, 2010Assignee: Aerohive Networks, Inc.Inventors: Jianlin Zeng, Changming Liu
-
Publication number: 20100278181Abstract: A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier.Type: ApplicationFiled: July 12, 2010Publication date: November 4, 2010Applicant: JUNIPER NETWORKS, INC.Inventors: Changming LIU, Choung-Yaw Shieh, Yonghui Cheng
-
Patent number: 7808893Abstract: A system includes a first network device and a second network device. The first network device includes a group of first logical portions and is configured to detect a problem with one of the first logical portions, and transmit a message identifying the one first logical portion. The second network device includes a group of second logical portions, where the group of second logical portions corresponds to the group of first logical portions. The second network device is configured to receive the message from the first network device, and activate the one second logical portion corresponding to the one first logical portion in response to receiving the message.Type: GrantFiled: January 19, 2005Date of Patent: October 5, 2010Assignee: Juniper Networks, Inc.Inventors: Changming Liu, Xiaosong Yang, Lin Chen
-
Patent number: 7779461Abstract: A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier.Type: GrantFiled: November 16, 2004Date of Patent: August 17, 2010Assignee: Juniper Networks, Inc.Inventors: Changming Liu, Choung-Yaw Shieh, Yonghui Cheng
-
Publication number: 20100195529Abstract: Systems, apparatus, methods, and computer program products for multicast access control are provided to analyze incoming data based on a source zone and a destination zone of the incoming data. Appropriate access control rules are applied to incoming data based on the results of the analysis. Additional implementations of a multicast access control include using a proxy rendezvous point operable to function as a rendezvous point in place of a physical rendezvous point.Type: ApplicationFiled: April 6, 2010Publication date: August 5, 2010Applicant: JUNIPER NETWORKS, INC.Inventors: Changming LIU, Gregory M. LEBOVITZ, Purvi DESAI
-
Patent number: 7725925Abstract: Systems, apparatus, methods, and computer program products for multicast access control are provided to analyze incoming data based on a source zone and a destination zone of the incoming data. Appropriate access control rules are applied to incoming data based on the results of the analysis. Additional implementations of a multicast access control include using a proxy rendezvous point operable to function as a rendezvous point in place of a physical rendezvous point.Type: GrantFiled: October 29, 2004Date of Patent: May 25, 2010Assignee: Juniper Networks, Inc.Inventors: Changming Liu, Gregory M. Lebovitz, Purvi Desai