Patents by Inventor Dexiang WANG

Dexiang WANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190335331
    Abstract: A method, an apparatus, and a system for performing authentication on a terminal in a wireless local area network are provided. The method uses a feature code as a part of an authentication credential. The feature code is a function of capability parameters of a terminal. The feature code can identify the terminal, so that the authentication server determines the authentication result based on a MAC address and the feature code of the terminal.
    Type: Application
    Filed: April 25, 2019
    Publication date: October 31, 2019
    Inventors: Qian WANG, Dexiang SONG, Daoli YU
  • Publication number: 20190319918
    Abstract: The method for a virtual machine to use a port and loopback IP addresses allocation scheme for full-mesh communications with transparent transport layer security tunnels is presented. In an embodiment, the method comprises detecting, at a redirect agent implemented in a first machine, a packet that is sent from a client application executing on the first machine toward a server application executing on a second machine; and determining, by the redirect agent, whether a first redirect rule matches the packet. In response to determining that the first redirect rule matches the packet, the redirect agent applies the first redirect rule to the packet to translate the packet into a translated packet, and provides the translated packet to a client agent implemented in the first machine to cause the client agent to transmit the translated packet to a server agent implemented in the second machine.
    Type: Application
    Filed: April 11, 2018
    Publication date: October 17, 2019
    Applicant: VMWARE, INC.
    Inventors: Daniel G. WING, Dexiang WANG, Nidheesh DUBEY
  • Publication number: 20190303186
    Abstract: Certain embodiments described herein are generally directed to handling a hypervisor restart event in a distributed network system. Embodiments include receiving, by a central controller, a session identifier from a first hypervisor. Embodiments further include comparing, by the central controller, the session identifier to a stored session identifier associated with the first hypervisor. Embodiments further include determining, by the central controller based on the session identifier not matching the stored session identifier associated with the first hypervisor, that the first hypervisor has restarted. Embodiments further include updating, by the central controller, the stored session identifier associated with the first hypervisor to match the session identifier. Embodiments further include identifying, by the central controller, a second hypervisor that is associated with the first hypervisor.
    Type: Application
    Filed: March 28, 2018
    Publication date: October 3, 2019
    Inventors: Bin QIAN, Amit CHOPRA, Dexiang WANG, Chen LI, Feng PAN, Jianjun SHEN, Aayush SAXENA, Yang PING
  • Publication number: 20190235894
    Abstract: An approach for a hypervisor to throttle CPU utilization based on a CPU utilization throttling request received for a data flow is presented. A method comprises receiving a request for a CPU utilization throttling. The request is parsed to extract a CPU utilization level and a data flow identifier of the data flow. Upon receiving a data packet that belongs to the data flow identified by the data flow identifier, a packet size of the data packet is determined, and a rate limit table is accessed to determine, based on the CPU utilization level and the packet size, a rate limit for the data packet. If it is determined, based at least on the rate limit, that the CPU utilization level for the data flow would be exceeded if the data packet is transmitted toward its destination, then a recommendation is generated to drop the data packet.
    Type: Application
    Filed: January 26, 2018
    Publication date: August 1, 2019
    Applicant: NICIRA, INC.
    Inventor: Dexiang WANG
  • Publication number: 20190166109
    Abstract: Certain embodiments described herein are generally directed to methods and apparatus for providing a security parameter index (SPI) value for use in establishing a security association between a source tunnel endpoint and a destination tunnel endpoint. In some embodiments, utilization of the SPI bit space is optimized to allow the scaling of key policies within a network. In some embodiment, using an SPI derivation formula, a server in the network is able to generate SPI values whose bit spaces are optimized to allow key policies to scale out.
    Type: Application
    Filed: November 30, 2017
    Publication date: May 30, 2019
    Inventors: Dexiang WANG, Zhen MO, Fang PENG, Bo HU, Helen LIU
  • Publication number: 20190132296
    Abstract: A first host receives a packet from a first compute node for a second compute node of a second host. The payload is larger than a maximum transmission unit size. The first packet is encapsulated with an outer header. The first host analyzes a length of at least a portion of the outer header in determining a size of an encrypted segment of the payload. Then, the first host forms a plurality of packets where each packet in the packets includes an encrypted segment of the payload, a respective encryption header, and a respective authentication value. The payload of the first packet is segmented to form a plurality of encrypted segments based on the size. The first host sends the packets to the second host and receives an indication that a packet was not received. A second packet including the encrypted segment is sent to the second compute node.
    Type: Application
    Filed: October 27, 2017
    Publication date: May 2, 2019
    Inventors: Wenyi Jiang, Daniel G. Wing, Bin Qian, Dexiang Wang
  • Publication number: 20190102232
    Abstract: An approach for an adaptive, performance-oriented, and compression-assisted encryption scheme implemented on a host computer to adaptively improve utilization of CPU resources is provided. The method comprises queueing a new data packet and determining a size of the new data packet. Based on historical data, a plurality of already encrypted data packets is determined. Based on information stored for the plurality of already encrypted data packets, an average ratio of compression for the plurality of already encrypted data packets is determined. Based on the average ratio of compression, a throughput of compression value and a throughput of encryption value, a prediction whether compressing the new data packet will reduce a CPU load is derived. If it is determined that compressing the new data packet will improve utilization of the CPU resources, then a compressed new data packet is generated by compressing the new data packet.
    Type: Application
    Filed: September 29, 2017
    Publication date: April 4, 2019
    Applicant: NICIRA, INC.
    Inventors: Dexiang WANG, Calvin QIAN, Dan WING, Gang XU, Bin ZAN
  • Publication number: 20190065265
    Abstract: Computer system and method for characterizing throughput performance of a datacenter utilize bandwidth information of physical network interfaces in the datacenter and results of benchmark testing on throughput on a single processor core to compute a plurality of throughput constraints that define a throughput capacity region for the datacenter to improve throughput performance of the datacenter.
    Type: Application
    Filed: August 25, 2018
    Publication date: February 28, 2019
    Inventors: Dexiang WANG, Bin QIAN, Jinqiang YANG, Naga S. S. Kishore KANKIPATI, Sanal PILLAI, Sujatha SUNDARARAMAN, Ganesan CHANDRASHEKHAR, Rishi MEHTA
  • Publication number: 20190018698
    Abstract: A technique for placing virtual computing instances in hosts in a data center to improve capacity and scalability in the network connecting the hosts in the data center. The network is viewed in regard to the physical placement of the servers and resource slots the servers have for supporting virtual computing instances and in regard to the communication traffic between virtual computing instances supported by the servers. A management system collects the resource slots into slot clusters based on their physical location and the virtual computing instances into virtual computing instance clusters based on communication traffic between pairs of virtual computing instances. The management system then maps the virtual computing instance clusters to the slot clusters to determine their physical placement in the network.
    Type: Application
    Filed: July 17, 2017
    Publication date: January 17, 2019
    Inventor: Dexiang WANG
  • Publication number: 20180311143
    Abstract: The present invention provides a skin penetration enhancing method and its penetration enhancer which is comprised of sponge spicules or a biologically effective amount of sponge spicules or a combination containing sponge spicules. The penetration enhancer can be applied onto the skin to overcome the skin stratum corneum barrier, which can increase the percutaneous absorption of drugs, vaccines and cosmetics into different skin layers or can improve the transdermal delivery of all these therapeutics into the systemic blood circulation. This technology can be used for dermal delivery of therapeutics into the skin or for transdermal delivery of therapeutics across the skin into systemic blood circulation.
    Type: Application
    Filed: July 5, 2018
    Publication date: November 1, 2018
    Inventors: Ming CHEN, Dexiang WANG